Los Angeles Information Security Foru
m 2013

\n

The Los Angeles Information Security Forum 2013 brings tog
ether experienced IT and information security practitioners for confidenti
al information sharing on the industry’s most important issues\, technolog
ies\, and trends. The two-day Forum includes keynote addresses\, technical
and strategic roundtable discussions led by IANS’ Faculty\, networking ev
ents\, and the opportunity to learn about new technologies. Click here to download
a copy of the agenda.

\n

Why Attend Los Angeles Information Security
Forum 2013

\n

\n

Gain tangible\, real world insights on best pr
actices and lessons learned directly from your peers

\n

Stay curren
t with emerging technologies and early-stage deployments

\n

Connect
with the industry’s leading minds

\n

Network and connect with othe
r influential senior IT managers and business leaders

IANS was founded in 2001 as the Institute for Applied Network Se
curity. Inspired by the Harvard Business School experience of interactive
discussions driving collective insights\, IANS adapted that format to fit
the needs of the information security community.

\n

What We Do

\n

\n

Decision Support – IANS offers an annual service for both larg
e enterprises and smaller teams of information security professionals whic
h enables users to connect to and learn from industry thought leaders and
peers through events\, personal inquiries\, written research\, and more.
li>\n

Events – IANS’ Information Security Forums bring together experie
nced IT and information security practitioners for confidential informatio
n sharing on the industry’s most important issues\, technologies\, and tre
nds.

FloCon 2014

\n

FloCon 2014\, a network security confe
rence\, takes place at the Francis Marion Hotel in Charleston\, South Caro
lina\, on January 13–16\, 2014. This open conference provides a forum for
operational network analysts\, tool developers\, researchers\, and other p
arties interested in the analysis of large volumes of traffic to showcase
the next generation of flow-based analysis techniques.

\n

Conference
Program Sessions

\n

The conference program is now available. Be sur
e to check out this year’s program sessions.

\n

Keyn
ote Speaker

\n

Dr. Paul Vi
xie is the CEO of Farsight Security. He previously served as President\, C
hairman\, and Founder of Internet Systems Consortium (ISC)\, as President
of MAPS\, PAIX and MIBH\, as CTO of Abovenet/MFN\, and on the board of sev
eral for-profit and non-profit companies. He has served on the ARIN Board
of Trustees since 2005\, where he served as Chairman in 2008 and 2009\, an
d he is a founding member of ICANN Root Server System Advisory Committee (
RSSAC) and ICANN Security and Stability Advisory Committee (SSAC).

\n

Vixie has been contributing to Internet protocols and UNIX systems as a p
rotocol designer and software architect since 1980. He is considered the p
rimary author and technical architect of BIND 8\, and he hired many of the
people who wrote BIND 9 and the people now working on BIND 10. He has aut
hored or co-authored a dozen or so RFCs\, mostly on DNS and related topics
\, and of Sendmail: Theory and Practice (Digital Press\, 1994). He earned
his PhD from Keio University for work related to the Internet Domain Name
System (DNS and DNSSEC).

\n

Call for Participation

\n

FloCon 2
014 will focus on perspectives. We are accepting abstracts for presentatio
ns\, posters\, and demonstrations. What have we learned in 10 years of flo
w analysis? What has worked? Where can we do better? We invite submissions
that look at flow analysis in perspective. Perspectives can be in relatio
n to past work in flow analysis\, changes in the threat landscape and oper
ational environment\, changes in technologies\, or changes in the relative
value of flow vs. other data sources. Submissions that broaden our perspe
ctives in the following areas are also welcome:

\n

\n

Measurement
and metrics

\n

Discovering and evaluating indicators of malicious
behavior

\n

Automated analysis

\n

Flow collection technology

\n

Augmenting and annotating flow data

\n

Network flow moni
toring used in conjunction with other data sources

\n

Integrating d
ata sources

\n

Data fusion

\n

Optimizing analyst workflow\n

Scalable statistical techniques

\n

Data visualization for o
perational environments and reporting

\n

Visual perspectives for di
splaying large amounts of quantitative information

ShmooCon 2014

\n

DIFFERENT - ShmooCon is an annual
east coast hacker convention hell-bent on offering three days of an inter
esting atmosphere for demonstrating technology exploitation\, inventive so
ftware and hardware solutions\, and open discussions of critical infosec i
ssues. The first day is a single track of speed talks called One Track Mi
nd. The next two days bring three tracks: Build It\, Belay It and Bring
It On.

\n

AFFORDABLE - ShmooCon is about high quality without
the high price. Keep in mind that space is limited\, and we’ve sold out q
uickly every year.

\n

ACCESSIBLE – ShmooCon 2014 is held in Wa
shington\, DC at the Washington Hilton about four blocks from the DC Metro
’s Dupont Circle Station. Fly into DCA\, IAD or BWI or take a train to Un
ion Station\, and you’re just a short cab ride away from the con.

\n

ENTERTAINING – Brain melting from all the cool tech you’re learning
? Be sure to check out the other events running during ShmooCon\, includi
ng ShmooCon Labs\, the Lockpick Village\, Ghost in the Shellcode and more.

Archives

The Shmoo Group (TSG)
is an independent think-tank of security professionals from around the wor
ld who donate their time and energy towards information security research
and development. Several years ago TSG had an idea. This idea has grown in
to a community recognized annual security conference attended by over 1800
people.

\n

Our goal for ShmooCon is to educate\, inform\, and entert
ain the attendees. ShmooCon is primarily a security conference\, but we en
courage innovative and interesting submissions on offbeat technology topic
s.

BSides Columbus 2014

\n

Each BSides
is a community-driven framework for building events for and by information
security community members. The goal is to expand the spectrum of conver
sation beyond the traditional confines of space and time. It creates oppo
rtunities for individuals to both present and participate in an intimate a
tmosphere that encourages collaboration. It is an intense event with discu
ssions\, demos\, and interaction from participants. It is where conversati
ons for the next-big-thing are happening.

SANS Security East 2014

\n

SANS is looking forward to an exciting
kickoff of 2014 with SANS Security East 2014 in the “Big Easy” in January.
Start the year off right by choosing from outstanding\, cutting-edge cour
ses presented by our top-rated instructors. Now is the time to improve you
r information security skills and laissez les bons temps rouler!

\n

T
he lineup of cybersecurity training and Infosec training courses for profe
ssionals at all levels has something for everyone. Don’t miss our special
events and bonus evening presentations where we’ll share the latest threat
s and much more.

\n

5% OFF Any SANS Course in Any Format!\nCoupon Cod
e: EHN_SANS5

Enhance Your Training
With Certifications at SAN Security East 2014

\n

Complete your SANS
training experience with a GIAC certification attempt! Put the skills you’
ll learn to practical use and join more than 51\,000 GIAC certified profes
sionals who make the Cybersecurity industry safe! Click the GIAC cert next
to the course name on event home page for more information about each cer
t\, and register for your certification attempt today.

\n

The SANS Te
chnology Institute (STI) offers a Master’s Degree in Information Security
Management and Master’s Degree in Information Security Engineering. Many o
f the courses offered at SANS Security East 2014 will count towards one of
these Master’s Degree programs once you apply for admission. Each course
page has a link to Masters Program to help you find out more.

\n

Cus
tomer Testimonials

\n

Here’s what SANS Security East alumni had to s
ay about their training:

“I would definitely recommend Security 401.
I’ve been in the personnel and physical security sector for years and neve
r really got into cyber until Feb of last year. This is very informative.
Would recommend it to everyone.” – Katrina Bright\, GNS Contracting at Dep
t of Energy\,

CyberTech 2014

\n

CyberTech 2014 hosts the latest and most innovative solutions in the
cyber industry – more than 100 startup companies that are and showcasing i
n our Startup Pavilion. Rest assured that you will get exposed to the late
st\, most exciting innovation scene in the cyber industry.

\n

Opening Keynote: Prime Minister of Israel\, Mr. Ben
jamin Netanyahu

\n

The accelerating cyber revolution of recent years
altered the world we live in\, with ever changing threats and opportuniti
es flowing between the physical domain we were born to and the virtual rea
lm we created. All of that has inevitably inspired the introduction of inn
ovative concepts\, products and services in a variety of technological fie
lds. Successful adaptation to these rapid dynamics makes it essential to b
e vigilant in the face of constantly evolving challenges and solutions. Fo
r this cause\, we are pleased to invite you to the International Exhibitio
n & Conference for Cyber Solutions\, which will bring together leading mul
ti-national companies\, over a hundred start-ups\, private and corporate i
nvestors\, venture capital firms\, experts\, clients and many more. The ev
ent will be opened by the Prime Minister of Israel\, Mr. Benjamin Netanyah
u\, followed by global figures in this arena\, with the participation of d
elegations from all over the world.

\n

As a technology and business d
riven exhibition\, it will join the cyber community in its study and pursu
it of groundbreaking cyber defense solutions for numerous sectors and thei
r unique needs. In parallel\, several sessions will be held on development
s at the frontier of this field\, presented by top professionals and decis
ion makers in this vibrant industry.

\n

Networking at CyberTech 2014

\n

CyberTech 2014 is the perfect opportunity to hear from and meet
a range of companies seeking a combination of partners\, investment and pr
ofessional services to develop their companies. There are plenty of networ
king opportunities to meet with potential investors and collaborators duri
ng the three days of the event. Our online b2b meeting tool Chance2​meet w
ill give you direct access to the other participants’ profiles\, and help
you make new connections prior to the conference\, thus maximizing your pr
esence at the show.

In addition to these popular traini
ng courses AppSec 2014 provides evening Summit sessions where you can soak
in the latest application security lessons from key industry leaders and
practitioners at top companies.

\n

5% OFF Any SANS Course in Any Format!\nCoupon Code: EHN_SANS5

Evening Summit
sessions\, which are complimentary with any class enrollment*\, enable att
endees to couple SANS technical training with engaging at night talks so y
ou can maximize your learning and minimize time away from the office.

\n

*All course registrations include attendance at the evening Summit se
ssions. For non-students\, a Summit-only pass may be purchased for $100.
p>\n

GIAC Certification

\n

You can sign up for GIAC certification at a re
duced rate in conjunction with some of the courses at this event. When you
purchase a certification option\, you will have four months after the eve
nt concludes to successfully pass the associated online exam.

BSides Hunts
ville 2014

\n

Each BSides is a community driven framework for buildi
ng events for and by information security community members. The goal is t
o expand the spectrum of conversation beyond the traditional confines of s
pace and time. It creates opportunities for individuals to both present an
d participate in an intimate atmosphere that encourages collaboration. It
is an intense event with discussions\, demos\, and interaction from partic
ipants. It is where conversations for the next-big-thing are happening www.securitybsides.o
rg.

\n

Who are we?

\n

BSidesHuntsville is organized to hel
p encourage\, educate\, empower\, inspire and expand IT knowledge to all n
eighbouring high school students. The goal is to foster communication and
collaboration while increasing the level of interest and improving the IT
skills of high school students\, in the area of cyber security and threats
associated with it. BsidesHuntsville bring major conferences free to High
School Students to attend and focus on the next-big-thing hot topics in i
nformation security.

\n

Continen
tal Breakfast/Lunch/Snacks: FREE!!!!

\n

Event Planners for
BSides Huntsville 2014

\n

\n

Paul Coggin

\n

Charline F. N
ixon

\n

Nisheeth Agrawal

\n

Naina Patnayakuni

\n

Ravi
Patnayakuni

\n

\n

Volunteers for BSides Huntsville 2014

\n

\n

Doug Brazier

\n

Scott Busby

\n

Sahil Patnayakuni
li>\n

Tammy Dean

\n

Latosha Baldwin

\n

Larry & Maribeth N
ewman

\n

Colby Castle

\n

IT Clubs Members of Calhoun Communi
ty College

\n

\n

More info on BSides Huntsville 2014 will be pos
ted when it becomes available.

Nullcon Goa 2014

\n

The nullcon conf
erence is a unique platform for security companies/evangelists to showcase
their research and technology. Nullcon hosts Prototype\, Exhibition\, Tra
inings\, Free Workshops\, null Job Fair at the conference. It is an integr
ated and structured platform which caters to the needs of IT Security indu
stry at large in a comprehensive way. Features of Nullcon Goa 2014 include
:

Nullc
on was founded in 2010 with the idea of providing an integrated platform f
or exchanging information on the latest attack vectors\, zero day vulnerab
ilities and unknown threats. Our motto – “The neXt security thing!” drives
the objective of the conference i.e. to discuss and showcase the future o
f information security and the next-generation of offensive and defensive
security technology. The idea started as a gathering for researchers and o
rganizations to brain storm and demonstrate why the current technology is
not sufficient and what should be the focus for the coming years pertainin
g to information security. In addition to security\, one of the section of
the conference called Desi Jugaad (Hindi for “Local Hack”) is dedicated t
o hacking where we invite researchers who come up with innovative security
/tech/non-tech solutions for solving real life challenges or taking up new
initiatives.

BSides Tampa
Bay 2014

\n

Each BSides is a community-driven framework for buildin
g events for and by information security community members. The goal is t
o expand the spectrum of conversation beyond the traditional confines of s
pace and time. It creates opportunities for individuals to both present a
nd participate in an intimate atmosphere that encourages collaboration. It
is an intense event with discussions\, demos\, and interaction from parti
cipants. It is where conversations for the next-big-thing are happening.
p>\n

Attack of the Cyber Pirates<
/h2>\n

Call for Presenters

\n

The CFP is officially open and acce
pting proposals. To learn more about the CFP and how to submit a proposal
please click on the link below:

BSides San Francisco 2014

\n

Each BSides is a community-driven framework for building events for and
by information security community members. The goal is to expand the spe
ctrum of conversation beyond the traditional confines of space and time.
It creates opportunities for individuals to both present and participate i
n an intimate atmosphere that encourages collaboration. It is an intense e
vent with discussions\, demos\, and interaction from participants. It is w
here conversations for the next-big-thing are happening.

\n

2014 is a transition year for Security BSides San Francisco. If you wo
uld like to lead or participate in organizing BSides San Francisco 2015 pl
ease volunteer to help with this year’s event to see what’s involved in ma
king an event happen.

RSA Conf
erence USA 2014

\n

Where the World Talks Security

\n

RSA Conf
erence is helping drive the information security agenda worldwide with ann
ual industry events in the U.S.\, Europe and Asia. Throughout its history\
, RSA Conference has consistently attracted the world’s best and brightest
in the field\, creating opportunities for conference attendees to learn a
bout IT security’s most important issues through first-hand interactions w
ith peers\, luminaries and emerging and established companies. As the IT s
ecurity field continues to grow in importance and influence\, RSA Conferen
ce plays an integral role in keeping security professionals across the glo
be connected and educated.

Securing The Human: How to Build\, Mainta
in and Measure a High-Impact Awareness Program

\n

Lethal Network Fo
rensics

\n

Mobile Device Security

\n

\n

About RSA Confer
ence

\n

RSA developed the RSA Conference in 1991 as a forum for cryp
tographers to gather and share the latest knowledge and advancements in th
e area of Internet security. Today\, the RSA Conference and related\, RSA
Conference branded activities\, are still managed by RSA\, the Security Di
vision of EMC\, with the support of the industry. RSA Conference event pro
gramming is judged and developed by information security practitioners and
other related professionals.

\n

Why Attend RSA Conference USA 2014?

\n

RSA Conferences are the pulse point of the security industry whe
re leading practitioners connect to protect. Here you’ll meet with top ind
ustry leaders and fellow security specialists to: Explore the most importa
nt security challenges facing your organization Discover how the latest ad
vances in technology can help you meet those challenges Build meaningful p
rofessional relationships that keep you at the top of your profession.

BSides Vanc
ouver 2014

\n

The Mainland Advanced Research Society is pr
oud to announce its second annual Security B-Sides Conference. The inaugur
al 2013 event attracted over 80 attendees ranging from developers to netwo
rk administrators to vulnerability researchers to IT directors and feature
d speakers from a broad range of organizations locally as well as internat
ionally. We are excited to finally announce the details of our 2014 event
which will be hosted at the Chateau Granville Hotel over two days and wil
l be more than double the size of the 2013 event featuring not only a spea
ker’s track but new to this year: a workshop track.

\n

/WH
AT

\n

What is B-Sides you might ask? Well\, B-Sides are no
t-for-profit\, open-source\, independently run\, community supported infor
mation security conferences that happen all over the world. Security B-Sid
e Conferences strive to be the unconference to the stereotypical and seemi
ngly homogenous security conferences that have evolved from educational fo
rums to marketing junkets.

This
conference is for everyone who has an interest or desire to learn about c
omputer security.

\n

/HOW/Do

\n

New this year\, Security BSide
s Vancouver 2014 will be running a Workshop track which will provide atten
dees with the opportunities to get their hands dirty. We need members of t
he information security community who want to share a skill or teach a tri
ck and give back to the community.

\n

We have opened a Call For Works
hops and… also want you to submit!B-Sides is accepting proposals for:

\n

\n

180 minute (2 hours) workshops

\n

240 minute (3 hours)
workshops

\n

\n

/HOW/Attend

\n

Security B-Sides is proud
to offer low cost and no cost options for attendees who are interested in
being a part of the conference and the community. We will be releasing tic
kets in January 2014. Stay tuned!

\n

More info on BSides Vancouver 20
14 will be posted when it becomes available.

CanSecWest 2014

\n

Interact with the s
ecurity community

\n

The 14th annual CanSecWest conference will be h
eld March 12-14 2014 at the Sheraton Wall Centre hotel in downtown Vancouv
er\, British Columbia.

\n

CanSecWest 2014\, the world’s most advanced
conference focusing on applied digital security\, is about bringing the i
ndustry luminaries together in a relaxed environment which promotes collab
oration and social networking. The conference lasts for three days and fea
tures a single track of thought provoking presentations\, each prepared by
an experienced professional and talented educator who is at the cutting e
dge of his or her field. We give preference to new and innovative material
\, highlighting important\, emergent technologies\, techniques\, or best i
ndustry practices.

\n

The conference is single track\, with one hour
presentations over the duration beginning at 9:00 a.m. The registration fe
e includes the catered meals\, and there will be a vendor display and loun
ge/eating area\, where wireless internet access will be available (as well
as in the speaking theater).

\n

CanSecWest 2014 Speakers and Talk I
nformation

CanSecWest 2014: Security Masters Dojo Vancouver

\n

To add
ress the need for intermediate and advanced educational requirements that
go beyond the introductory materials typically found in most currently exi
sting training (which are often geared towards the novice level) for profe
ssionals who already have significant work experience\, and want to furthe
r improve their skills\, we have assembled a curriculum of hands-on\, one
day\, training programs – delivered by industry renowned experts who are p
re-eminent in their fields.

\n

This is information security universit
y level training for practitioners who already have substantial knowledge
and wish to broaden their boundaries. It goes beyond introductory level ma
terial to focus and delve more deeply into technical subjects that aren’t
addressed in other currently available training. For more details: http://cansecwest.com/dojo.html

Troopers14

Welcome t
o TROOPERS\, your favorite IT-Security Conference.

\n

\n

\n

Troopers14 is the seventh edition of the great IT-Securit
y Conference\, where the world’s leading IT-Security experts and Hackers p
resent their latest research.

\n

Troopers provides a networking platf
orm for Security interested people from all over the world and enables sec
urity folks from the industry\, academia and the research community to exc
hange knowledge and talk about their work. Again\, Troopers14 is going to be an event unlike most other “security conferences”: No
pointless marketing talks\, just high-end workshops with hands-on experien
ces and most importantly: You’ll get real answers and practical benefits t
o meet today´s and tomorrow’s threats.

Now you have the opportunity to
be a part of this special conference Troopers14. The Sign up is open now and the fir
st part of the agenda is published\, t
oo. Do not hesitate and get your ticket today.

\n

\n

\n

We w
ould love to meet you in March 17th – 21th 2014 in Heidelberg\, Germany. B
ecause this is what the event is all about: Getting the right people toget
her in one place at one time.

\n

PacketWars™ @ TROOPERS14

\n

<
strong>This year we introduce mentored attendee teams to the battlefields
of PacketWars™! Experienced experts from ERNW teach you how to hack your w
ay through the challenges. Don’t hesitate to use this golden opportunity t
o gain some serious practical skills. If you want to defend your systems y
ou need to know how others will try to break them.

\n

Contact us immediately to sign-up for the very limited seats in the team. First-come\, first-served.\nIt’s free\, it’s fun and there are prizes waiting for you!

\n

W
hat is PacketWars?

\n

PacketWars™ is a sport like nothing you have e
ver experienced! Games known as Battles pit individual players each other
in a race against time to achieve predeﬁned objectives\, win prizes and at
tain FAME. Operating in the shadows of the Internet beyond the rule of TCP
/IP and devoid of compassion\, a secret war rages. Sometimes spilling over
into the “real” world\, digital battles are waged to advance the will of
the combatants.

\n

Michael from ERNW seems to be quite calm instead w
hile he owns machine after machine.

\n

The combatants are as varied a
s their skills and motivation. Every engagement is unique. It is our duty
to chronicle these events. Join us as we open a portal to extreme hacking.
Do you have what it takes to survive? This event takes place after the sh
ared TROOPERS dinner on Wednesday evening. BYOL (Bring Yo
ur Own Laptop)\, if you want to join!

BSides Austin 2014

\n

Each BSides
is a community-driven framework for building events for and by information
security community members. The goal is to expand the spectrum of conver
sation beyond the traditional confines of space and time. It creates oppo
rtunities for individuals to both present and participate in an intimate a
tmosphere that encourages collaboration. It is an intense event with discu
ssions\, demos\, and interaction from participants. It is where conversati
ons for the next-big-thing are happening.

\n

More info on BSides Aust
in 2014 will be posted when it becomes available.

Black Hat
Asia 2014

\n

Black Hat is returning to Asia for the first time sinc
e 2008\, and we have quite an event in store. Here the brightest professio
nals and researchers in the industry will come together for a total of fou
r days–two days of deeply technical hands-on Trainings\, followed by two d
ays of the latest research and vulnerability disclosures at our Briefings.

The
Black Hat Briefings have become the biggest and the most important securi
ty conference series in the world by sticking to our core value: serving t
he information security community by delivering timely\, actionable securi
ty information in a friendly\, vendor-neutral environment.

Black Hat Asia 2014 is set to
bring together the best minds in security to define tomorrow’s informatio
n security landscape in Singapore. This year’s Training courses offer the
essential knowledge and skills to defend your enterprise against today’s t
hreats.

\n

Special Events @ Black Hat Asia 2014

\n

\n

Black Hat Arsenal – March 27-28\, 2014 | 10:00-18:00 | Cassia
3211 & 3311 – Black Hat is pleased to once again present Arsenal–a Tool/D
emo area where independent researchers and the open source community will
showcase some awesome weapons.

\n

Delegate Reception – March 27\, 2014

\n

Event Audio & Video Booth
– March 27-28\, 2014 – The Source of Knowledge will be onsite to sell audi
o and video recordings of the Briefings sessions. You can purchase the med
ia onsite at a substantial discount.

\n

\n

About Black Hat

\n

The Black Hat Briefings are a series of highly technical information
security conferences that bring together thought leaders from all facets o
f the infosec world – from the corporate and government sectors to academi
c and even underground researchers. The environment is strictly vendor-neu
tral and focused on the sharing of practical insights and timely\, actiona
ble knowledge. Black Hat remains the best and biggest event of its kind\,
unique in its ability to define tomorrow’s information security landscape.

\n

In addition to the large number of short\, topical presentations
in the Briefings\, Black Hat also provides hands-on\, high-intensity\, mul
ti-day Trainings. The Training sessions are provided by some of the most r
espected experts in the world and many also provide formal certifications
to qualifying attendees. Arrangements can also be made to bring Black Hat’
s trainers to your location for private and customized training.

BSide
s Puerto Rico 2014

\n

In Security BSides Puerto Rico 2014’s goal is
to integrate the Hardware\, Developer\, Offensive and Defensive community
in one InfoSec summit. This year we will focus on hands on\, innovation an
d competition. BSides makes a difference in Puerto Rico because it is the
only non-vendor based security conference in the island promoting informat
ion sharing about hot topics in the information security field. #BSidesPR
will be a bilingual conference offering talks in both English and Spanish
acting as bridge between cultures.

\n

Security B-Sides Puerto Rico #B
SidesPR was the first community driven serious InfoSec conference in the i
sland fully educational and not vendor biased in 2013. Now in 2014 we will
stay focused on one thing\, the growth of the InfoSec community in Puerto
Rico through the learning experience.

\n

More info on BSides Puerto
Rico 2014 will be posted when it becomes available.

BSides Orlando 2014

\n

Security B-Sides is a framework of events
that enables individuals to expand the spectrum of conversation beyond the
confines of traditional media. Frameworks such as BSides enable individua
ls to drive the event\, shape the media\, and encourage participation. BSi
des are free\, community organized events put on by local individuals with
the expressed goal of enabling a platform for information dissemination.
BSides is an ‘unconference’ that follows the ‘open spaces’ format. This va
ries from structured presentations to smaller break-out groups\, but both
provide a direct connection between speakers and the audience.

SANS 2014

\n

We would like to invite you back to SANS 2014 and
back to Disney for our biggest event of the year! If you haven’t been to S
ANS training in Orlando\, you can’t miss this! This is one of our biggest
events of the year\, so there is something for everyone. At SANS 2014\, yo
u will have countless opportunities to expand your network of security exp
erts and friends\, and you’ll learn more than you can imagine.

\n

5% OFF An
y SANS Course in Any Format!\nCoupon Code: EHN_SANS5

Many of our five- and six-day courses offered at S
ANS 2014 are associated with a GIAC Certification. Complete your SANS trai
ning experience with a GIAC certification attempt\; put the skills you’ll
learn to practical use and join nearly 53\,000 GIAC certified professional
s who make the Cybersecurity industry safe. Visit the GIAC page for more information
and register for your certification attempt today! See the STI Master’s De
gree page to find out which courses can be used for your STI Master’s
Degree when you apply.

\n

SANS 2014 Features

\n

\n

43 Cour
ses

\n

35 Instructors

\n

6 Disciplines

\n

\n

Our t
op instructors will be teaching at SANS 2014. Learn from some of the best
instructors in the cybersecurity industry. See our Instructors page to find out more.

\n

SANS’ national training events are known for their evening offerings\, whi
ch enhance your training\, and SANS 2014 is no exception. Our SANS
@Night Series will feature presentations on the most current top
ics in information security by some of the best speakers in the industry.
We have an impressive lineup already\, but keep an eye on our website and
use the Bonus Sessio
ns link to see when evening events are added. Be sure to include in yo
ur plans our extensive Vendor Tools Expo & Reception where you’ll see live
demonstrations of cutting-edge technologies. Our Vendors will be hosting
events to help you find the right mix of tools and solutions for your comp
any’s unique challenges.

InfoSec World 2014\n

Our 2014 program is designed to help arm you with the latest tools
and most current information to protect your organization. The result is a
roster of who’s who in the security community\, and these top experts and
practitioners will share their expertise\, advice and lessons learned in
over 70 highly relevant sessions! In addition to our dynamic main conferen
ce program\, we are also pleased to bring you three co-located summits and
11 workshops designed to complement the main agenda.

SOURCE Boston 20
14

\n

SOURCE Conference brings security experts and business profess
ionals together in an intimate and personal environment to discuss the sec
urity industry’s most important issues\, technologies\, and business trend
s. SOURCE takes the technical excellence and expertise found at top hacker
conference and places in an executive environment where business professi
onals can gain insight into the security industry’s most important issues\
, technologies\, and business trends.

\n

The purpose of SOURCE Confer
ence is to bridge the gap between technical excellence and business acumen
within the security industry. SOURCE fosters a community of learning wher
e business and security professionals come together to gain knowledge and
skills\, network with peers\, and advance their careers and professional d
evelopment. SOURCE enables individuals\, teams\, and organizations to leve
rage information to improve decision-making\, optimize performance\, and a
chieve business objectives.

\n

Who Attends SOURCE?

\n

SOURCE is designed for top security professionals\, advanced IT p
rofessionals\, senior and top-level executives\, company chief officers (e
.g.\, CTOs\, CSOs)\, faculty and students from colleges and universities\,
members of management and business communities who are looking to connect
with security and technology experts.

\n

The SOURCE Experie
nce

\n

SOURCE Boston attendees experience two and a half day
s of intense 50 minute sessions taught by top security experts. Sessions h
old 50-60 professionals\, providing an intimate environment where attendee
s can ask questions\, participate in discussions\, and interact with other
delegates and speakers.

Notacon 11

\n

notacon is a conference like no other.

\n

We explore the intersection of creativity\, co
mmunity and technology through presentations\, discussions\, competition a
nd good old fashioned hacking.

\n

Notacon is a fun weekend long even
t starting on the evening of Thursday April 10th\, 2014 with a free previe
w and closes on the morning of Sunday\, April 13th with wrap-up discussion
s and award. The event features three tracks of discussions and presentati
ons\, workshops and performances. In addition\, we have spaces dedicated t
o hardware hacking\, games\, amateur radio\, demo coding and our own strea
ming 24/7 radio stream\, Notacon Radio.

\n

Notacon is truly an event
created by and intended for the community. Everyone at Notacon is encourag
ed to participate and become more than simply an attendee in whatever way
they feel comfortable. We embrace those from diverse backgrounds\, ages an
d skill levels. We want everyone to join us in exploring\, learning and ha
ving fun.

\n

There are a couple of ways people participate in Notacon
\, whether it’s simply registering and showing up\, presenting\, performin
g or volunteering. Those interested in presenting\, performing\, etc. are
welcome to submit a proposal. Everyone else should register for the event.
We encourage everyone\, including locals\, to book a room at the conferen
ce hotel in order to get the most out of their Notacon experience.

\n\n

Get Involved

\n\n

\n

\n

There are many
ways to get involved at Notacon. If you feel you have something you can sh
are with the community by presenting\, then check out our Call for Proposals s
ection. If you are interested in volunteering for the event or becoming a
member of the staff\, please check out our information for volunteers.

\n

If you
are interested in sponsoring the event either financially or through donat
ions\, please read about our sponsorship opp
ortunities for all budgets. Likewise\, visit the page if you are simpl
y interested in advertising in our program.

HacKid 2014

Kids are our f
uture\, why not give them that spark that will set them on a journey that
only “hacking” can inspire?

\n

“Hacking” is the word our community ch
ooses to use to describe creative\, fun and innovative ways of exploring p
roblem solving.

\n

HacKid is a new kind of conference focused on prov
iding an interactive\, hands-on experience for the entire family— kids age
d 5-17 & their parents — in order to raise awareness\, excitement and unde
rstanding of technology\, gaming\, mathematics\, safety\, privacy\, networ
king\, security and engineering and their impact on society and culture.
We focus on STEAM (Science\, Technology\, Engineering\, Art and Mathematic
s) enablement.

\n

We enjoy a fantastic mix of racial\, gender and cul
tural diversity that reflects our community of amazing kids and we love ra
ising the next generation of “Hackers.” By the way\, “Hacking” is the wor
d our community chooses to use to describe creative\, fun and innovative w
ays of exploring problem solving.

\n

The idea for the conference revo
lves around providing an interactive\, hands-on experience for kids and th
eir parents which includes things like:

\n

\n

\n

Stayi
ng Safe Online

\n

Dealing with CyberBullies

\n

Robotics

\n

Online gaming safety

\n

Building Medieval Trebuchets

\nInteractive robot building\n

How the Internet works

\n

Fo
od Hacking

\n

Computerized Lego Derby racing

\n

Manipulating
hardware and software for fun

\n

Low-impact martial arts/self-defe
nse & anti-bullying techniques

\n

3D Printing

\n

Learning to
program in Scratch & Python

\n

…and much more!

\n

\n\n

The format of our conference is really interesting. Unlike a t
raditional conference where a call for papers is issued\, or a completely
unstructured “un-conference\,” we mix advisory board recommendations with
a crowd-sourced concept based on interesting submissions.

\n

Volunte
er at HacKid 2014

\n

Volunteers help every conference to be successf
ul. This is the same for HacKid 2014. Please help if you can: http://www.h
ackid.org/content/volunteer/

THOTCON 0x5

\n

THOTCON (pronounced \\ˈthȯt\\ and take
n from THree – One – Two) is a small venue hacking conference based in Chi
cago IL\, USA. This is a non-profit\, non-commercial event looking to prov
ide the best conference possible on a very limited budget.

\n

Once yo
u attend a THOTCON event\, you will have experienced one of the best infor
mation security conference experiences combined with a uniquely casual and
social experience.

\n

THOTCON 0x5 is the fourth incarnation of this
event and will be held on Friday\, April 25\, 2014. It is anticipated that
there will be 20 talks\, 3 workshops and around 750 attendees at 0x5.

\n

It will be held at a location only to be disclosed to attendees and s
peakers during the week before the event.

ShowMeCon
2014

\n

\n

Pre-Conference Training: April 30 – May 4\, 2014

\n

Conference: May 5 – 6

\n

\n

ShowMeCon. The name says it al
l. Known as the Show Me State\, Missouri is home to St. Louis-based ethica
l hacking firm\, Parameter Security\, and security training company\, Hack
er University. Together\, they are bringing you a one-of-a-kind event that
will Show You the State of security from a unique perspective – the hacke
r’s viewpoint.

\n

This highly technical forum showcases eye-opening p
resentations from world-renown ethical hackers and epic security ninjas wh
ich will leave you amazed and frightened at the same time. By giving you a
ccess into the mind of a hacker\, you will better understand how to protec
t your networks and critical data. As we always say “In order to beat a ha
cker\, you have to think like one” and “if you don’t understand the enemy\
, how can you protect against him?” ShowMeCon pulls back the curtain and e
xposes how hackers are winning the war on physical and cyber security.

\n

In addition to witnessing real-world hacks\, experts will tackle a va
riety of specialized topics\, such as hacking mobile devices\, cloud compu
ting\, leveraging mobile devices in pen tests\, cryptanalysis\, how the mo
st protected systems can be breached\, defending your systems\, computer f
orensics and more. Discover the latest vulnerabilities\, the most powerful
exploits and current security threats at this cutting-edge\, two day con.
Plus\, partake in our “capture the flag” event and take your best shot at
hacking into various environments.

Whether you’
re a large corporation or a small business\, you should attend this mind-b
lowing event as you witness the cream of the crop unveil the latest attack
s\, techniques\, tactics and practices of today’s hackers. Plus\, gain ins
ight and understanding into ways to effectively protect yourself so you ca
n implement this information immediately when you return to your business.

CONFidence 2014

\n

CONFidence is an annual IT
security conference that will take place on 27-28th May\, 2014 in Krakow\
, Poland for the 12th time! The best speakers\, latest issues\, laid-back
atmosphere and Krakow crazy night life – that is why CONFidence has become
a meeting point of hackers’ community in Europe.

\n

The core of CONF
idence 2014 is a two-day conference with workshops\, but the whole event i
s so much more. CONFidence 2014 offers not only the best speakers\, curren
t topics and top trainings\, but (even more importantly) great parties\, c
ool contests\, crazy social events and a time and space to meet community
members face-to-face\, talk\, drink and hack. Previous editions included s
tay in a Hackers’ Squad\, Hacking Contests\, Hackers for Charity Roulette
and big After Party. What will happen this year? Check out yourself!

\n

The first CONFidence conference was organized in 2005 as a project crea
ted by a group of Polish enthusiasts committed to improving the security o
f IT applications. Since those early years it has evolved into the largest
meeting of hackers in Poland that annually gathers almost 400 participant
s: IT security professionals from government\, industry\, banking sector a
nd academia as well as researchers and developers.

\n

Since 2006 CONF
idence assembles not only the best specialists from Poland but also attend
ees and number-one speakers from all around the world. Every year our atte
ndees come from most European countries as well as US to see such experts
as Bruce Schneier\, Dan Kaminsky\, Jacob Appelbaum\, Daniel Mende\, David
Hulton\, Chris Palmer\, Jesse Burns\, Shawn Merdinger\, Anton Chuvakin\, R
ichard Bejtlich\, Raoul Chiesa\, Felix Lindner\, Alexander Kornbrust\, Din
is Cruz\, Joanna Rutkowska\, Gynvael Coldwind\, Tavis Ormandy \, Meredith
L. Patterson\, Thomas Lim and many other excellent speakers. CONFidence is
much more than just a conference\, it is an ongoing project driven by the
security community. It is also a stop for an elite Hackers on a Plane ini
tiative.

\n

CONFidence 2014 fees:

\n

\n

145.00 EUR until 10th January 2014

\n

170.00 EUR un
til 21st February 2014

\n

195.00 EUR until 4th April 2014

\n

219.50 EUR until 16th May 2014

\n

305.00 EUR Last minute – until 2
7th May 2014

\n

135.00 EUR students until the day of the conference

\n

305.00 EUR Supporting Ticket – until the day of the conference<
/li>\n

\n

*Students registration is available only for private/edu r
egistrations. The students registration cannot be purchased by a company.<
/p>\n

We invite you to help us in organizing the conference by purchasin
g the Supporting Ticket.

HITBSecConf2014 – Amsterdam

\n

HITB celebrates
5th year in The Netherlands with 3 day Hacker Expo and an all Women Keyno
te Line Up Planned for 2014

\n

Hack In The Box has announced HITBSecC
onf2014 Amsterdam will feature an all-new Haxpo – a massive Hacker Expo op
en for free to professionals and the public. Haxpo will be running alongsi
de the popular HITB conference which will feature for the first time – an
all-women keynote lineup of leading security individuals.

\n

“2014 ma
rks our 5th year in the EU and we want to commemorate this with a large ce
lebration. A chance for us to do something different that we think has not
been done before – and we like doing things like that”\, said Dhillon And
rew Kannabhiran\, Founder and Chief Executive Officer\, Hack In The Box.
p>\n

Haxpo will run from the 28th to the 30th May 2014 at The Beurs van
Berlage in Amstedam. To encourage the spirit of inquisitiveness and innova
tion\, Haxpo will showcase cutting edge technology and security solutions
for industry professionals alongside fun\, hands-on tinkering and hacking
exhibits. The exhibition will include the Capture the Flag (CTF) battle\,
HackWEEKDAY developer hackathon\, a hackerspaces village with an area dedi
cated to makers and builders\, plus a lock picking area and a social engin
eering challenge – all under one roof.

\n

Entrance to HITB Haxpo will
be completely free and HITB is also encouraging all builders and hackersp
aces to apply for exhibition space which will be free for non-commercial e
ntities.

\n

Haxpo will run alongside the popular annual HITB conferen
ce which will introduce the first ever all-women keynote lineup of leading
security individuals.

“We’ve never had an all-women keynote line-up and with 2014 being
our 5th year anniversary in the EU\, we thought it was a perfect time to d
o so. Though there are still an insufficient number of women leaders in th
e IT sector\, we want to use this occasion to highlight a handful we feel
have made tremendous contributions. Most importantly\, they all offer a di
fferent point of view in an industry dominated by men”\, added Dhillon.

RVAsec 2014

\n

\n

RVAsec is the first Richmond\, Virginia\, security convention to bring
top speakers to the mid-atlantic region. The conference will be held on Fr
iday and Thursday\, June 5th and Friday June 6th at the Commonwealth Ballr
oom at VCU’s University Commons. Training classes will be held on Wednesda
y\, June 4th.

\n

What to expect at RVAsec 2014:

\n

\n

Awes
ome Keynotes

\n

Great speakers with great topics!

\n

Free Pa
rking

\n

Breakfast\, lunch\, coffee & snack breaks

\n

RVAsec
bag stuffed with swag

\n

RVAsec t-shirt

\n

Post-con recepti
on\, with adult beverages (and more food)

\n

After party

\n

\n

And more stuff is being planned!

\n

Training at RVAsec 2014

\n

RVAsec is pleased to announce training sessions to coincide with the confe
rence! Full-day training classes will be held on Wednesday June 4th before
the conference.

\n

The prices for training classes will depend on cl
ass requirements\, but will include breakfast & lunch. Breakfast and regis
tration start at 8 AM.

\n

The training location is the same as the co
nference\, with registration/breakfast in Virginia Room A (second floor).
Please see the directions and location pages for more information.

\n\n

\n

Lock Picking & Lock Forensic
s

\n

\n

Instructor: Schuyler Towne

\n

Cost: $250

\n
ul>\n

\n

\n

Networking for Pentesters

\n

\n

Instructor
: Rob Fuller

\n

Cost: $199.95

\n

\n

\n

\n

The Sec
rets of Security with the OSSTMM

\n

\n

Instructor: Pete Herzog
li>\n

Cost: $250

\n

\n

\n

\n

Into the Worm Hole: Meta
sploit for Web PenTesting

\n

\n

Instructor: Kizz MyAnthia

\n

Cost: $250

\n

\n

\n

\n

Note: Registratio
n for the conference and training are separate–a conference ticket is not
an admission ticket to training. The location is the same as the conferenc
e itself.

CircleCityCon 2014

\n

Circ
leCityCon is the first hacker con in Indianapolis. It is in a small to med
ium sized venue located in the heart of Indianapolis. The venue itself is
within walking distance of numerous food and bar establishments. We will h
ave two large tracks\, as well as events throughout the conference from ea
rly morning until late in the night. This gives the con attendees many dif
ferent options. It will be an extremely eventful experience.

\n

As we
grow in the coming months we will have lots of surprises.

\n

.:miss
ion:.

\n

The main goal of this conference is to educate and expand p
eople’s knowledge. We want attendees to have a great time\, meet amazing p
eople\, watch awesome talks\, participate in various events\, and experien
ce what Indianapolis has to offer.

BSidesCT 2014

\n

BSides Connecticut is an exciting day long informa
tion security conference hosted at Quinnipiac University’s beautiful York
Hill campus. The campus sits adjacent to the picturesque peaks of Sleeping
Giant Mountain in Hamden\, Connecticut\, which is just 90 minutes from Ne
w York City\, two hours from Boston\, and just eight miles north of New Ha
ven. With this ideal venue for collaborative presentations\, sharing of in
formation and ideas\, BSides Connecticut will help establish a much-needed
link between information security professionals and the Connecticut techn
ology community.

\n

Events:

\n

Capture the flag: Capture the most flags in our challenges for your chance to win aPenetration Testing with Kali Linux voucher from http://o
ffensive-security.com!

\n

Organizers:

\n

\n

Will Genov
ese

\n

Mike Dews

\n

William Reyor

\n

Patrick Tassos
li>\n

Jim Peeler

\n

Andrew Peterson

\n

Brian Kelly

\n

Mike Ruotolo

\n

Roman Simanovich

\n

Alvin Fong

\n\n\n

Wh
at is BSides?

\n

Each BSides is a community-driven framework for bui
lding events for and by information security community members. The goal i
s to expand the spectrum of conversation beyond the traditional confines o
f space and time. It creates opportunities for individuals to both present
and participate in an intimate atmosphere that encourages collaboration.
It is an intense event with discussions\, demos\, and interaction from par
ticipants. It is where conversations for the next-big-thing are happening.

\n

BSides’s History

\n

BSides was born out of number of rejec
tions to the CFP for Black Hat USA 2009. A number of quality speakers were
rejected\, not due to lack of quality but lack of space and time. Any con
strained system must operate within the bounds to which it has defined its
elf. Conferences constrain themselves to the eight hours a day for however
many days they run. Our goal is to provide people with options by removin
g those barriers and providing more options for speakers\, topics\, and ev
ents.

\n

Much like Noisebridge\, and other hacker spaces\, we are a d
o-acracy\; in other words\, if you want it\, then you do to it or make it
happen. We do not have members\, but rather participants. You are the “we”
and we can only be successful if you make that happen for yourself.

BSidesSaoPaulo
June 2014 World Cup Edition

\n

BSidesSP is a one-day conference on i
nformation security and hacker culture\, organized by local infosec profes
sionals with support from Brazilian hakerspace Garoa Hacker Clube. BSidesSP
aims to promote the hacker culture and the integration between security r
esearchers\, professionals\, and students.

\n

BSidesSP will be free o
f charge and wants to create a day full of activities to promote informati
on security and hacker culture in the country\, with various activities sc
heduled to take place simultaneously in four different tracks\, including
talks\, debates\, technical workshops and special “BSides 4 Kids” activiti
es.

\n

Planned activities for BSidesSaoPaulo include:

\n

\n

\n

One track for talks

\n

Technical worksh
ops

\n

Lightning Talks

\n

BSides 4 Kids\, including technica
l workshop for the little ones and Soccer Table games

\n

Amateur ro
botics competition (Game of Drones)

\n

Free Food

\n

The Pira
tes Bar

\n

\n

About São Paulo\, Brazil

\n

São Paulo is th
e largest city in Brazil and the world’s eighth largest city by population
. São Paulo is the capital of the state of São Paulo\, Brazil’s most popul
ous state. It exerts strong regional influence in commerce\, finance\, art
s and entertainment and a strong international influence. São Paulo has th
e largest economy\, by GDP\, among Latin American and Brazilian cities. It
is home to the São Paulo Stock Exchange\, the Future Markets and the Cere
al Market Stock Exchanges (the second largest stock exchange in the World\
, in market value). The city is home to several important monuments\, park
s and museums.

Planners

What is BSides?

\n

Each BSides is a community-driven framework for building ev
ents for and by information security community members. The goal is to ex
pand the spectrum of conversation beyond the traditional confines of space
and time. It creates opportunities for individuals to both present and p
articipate in an intimate atmosphere that encourages collaboration. It is
an intense event with discussions\, demos\, and interaction from participa
nts. It is where conversations for the next-big-thing are happening.

SC Congress Toronto 2014

Join us for this year’s SC Congress Toronto 2014 on Ju
ne 17-18! The two-day gathering brings industry thought leaders together
with the latest technology service solutions to provide you with the answe
rs you need to secure your enterprise network. In a jam-packed schedule\,
you will be apprised of the latest information security developments\, con
nect with colleagues and have access to:

\n

\n

Five industry-lead
ing keynote sessions

\n

Eight breakout sessions with a wide array o
f topics

\n

14 CPE credits in just two days

\n

A jam-packed expo floor with hands-on access to the latest technology
services and solutions

Esse
ntial Information for SC Congress Toronto 2014

\n

\n

Cyber threa
ts are real\, and they are constantly evolving. Get the most up-to-date in
formation that you can immediately take back to the office and implement t
o protect your sensitive information. Topics covered include:

\n

\n<
li>Canadian Privacy Legislation\n

PCI Revisited

\n

The Stat
e of Protecting North America’s Critical Infrastructure

\n

Mobile –
None of these things look like the other\, none of these things are the s
ame

\n

A Day in the Life of a CISO (Or How I Learned To Stop Worryi
ng and Embrace the Stress)

\n

Top 3 Threats

\n

Point of Sale
Malware (POS)

\n

The Sky is Falling – How to make the most out of
mainstream media reporting on security

\n

SSL vs. IPSec – From PC’s
to Smartphones and Back Again – What is Secure?

CFP for 2014 is now op
en

What is BSides?

\n

Each B
Sides is a community-driven framework for building events for and by infor
mation security community members. The goal is to expand the spectrum of
conversation beyond the traditional confines of space and time. It create
s opportunities for individuals to both present and participate in an inti
mate atmosphere that encourages collaboration. It is an intense event with
discussions\, demos\, and interaction from participants. It is where conv
ersations for the next-big-thing are happening.

\n

BSides’s History<
/h2>\n

BSides was born out of number of rejections to the CFP for Black
Hat USA 2009. A number of quality speakers were rejected\, not due to lack
of quality but lack of space and time. Any constrained system must operat
e within the bounds to which it has defined itself. Conferences constrain
themselves to the eight hours a day for however many days they run. Our go
al is to provide people with options by removing those barriers and provid
ing more options for speakers\, topics\, and events.

\n

Much like Noi
sebridge\, and other hacker spaces\, we are a do-acracy\; in other words\,
if you want it\, then you do to it or make it happen. We do not have memb
ers\, but rather participants. You are the “we” and we can only be success
ful if you make that happen for yourself.

NolaCon 2014

\n

\n

\n

Pre-Con training: June 19-20th\, 2014

\n

Con days: June 20-22\, 20
14

\n

\n

\n

Join us for NolaCon\, an Information Security/H
acker conference for professionals and enthusiasts alike located in New Or
leans\, offering training as well interesting and inventive sessions and w
orkshops. The sessions will cover a variety of topics focused on today’s i
nfosec climate\, but malware\, exploits\, vulnerabilities\, social enginee
ring\, and forensics are sure to be on the schedule.

\n

Both a lockpi
ck village (hosted by TOOOL) and a hardware village will be available for
people who want to take a break from the sessions\, sit down and learn (or
improve) a skill. And there will be lots of social opportunities at the C
on\, including some great music. Watch for the lineup coming soon.

\n

See some of NolaCon 2014’s speakers on the speake
rs page… more to be announced soon!!

BSidesCLT 2014

\n

The second annual BSides event in Charlotte\, NC will be held Ju
ne 21st. Visit the official BSides Wiki page.We are aga
in partnering with SELF to once again bring timely\, interesti
ng\, and relevant Information Security talks to a broader audience than wh
at you normally find at a security conference. SELF is an exce
llent annual event put on by some hardworking people. By joining forces we
’re lowering our expenses and able to focus on bringing you a quality secu
rity event. We’re planning some great talks.

\n

Planners

\n

\n

Chris Teodorski @can0beans

\n

Red
@noidd

\n

Jon Molesa @th3mojo

\n

Damon Brinkley
@damonbrinkley

\n

Tom Moore @c0ncealed

\n

Brya
n Tobey @_fmm

\n

\n\n

What is BSides?

\n

E
ach BSides is a community-driven framework for building events for and by
information security community members. The goal is to expand the spectru
m of conversation beyond the traditional confines of space and time. It c
reates opportunities for individuals to both present and participate in an
intimate atmosphere that encourages collaboration. It is an intense event
with discussions\, demos\, and interaction from participants. It is where
conversations for the next-big-thing are happening.

\n

BSides’s His
tory

\n

BSides was born out of number of rejections to the CFP for B
lack Hat USA 2009. A number of quality speakers were rejected\, not due to
lack of quality but lack of space and time. Any constrained system must o
perate within the bounds to which it has defined itself. Conferences const
rain themselves to the eight hours a day for however many days they run. O
ur goal is to provide people with options by removing those barriers and p
roviding more options for speakers\, topics\, and events.

\n

Much lik
e Noisebridge\, and other hacker spaces\, we are a do-acracy\; in other wo
rds\, if you want it\, then you do to it or make it happen. We do not have
members\, but rather participants. You are the “we” and we can only be su
ccessful if you make that happen for yourself.

SANSFIRE 2014

\n

For more than
10 years\, the Internet Storm Center has been providing free analysis and
warning to our community. SANSFIRE 2014 is not just another training event
. It is our annual “ISC Powered” event. It taps into the expertise behind
our daily postings\, podcasts\, and data collection efforts by offering ev
ening events focusing on current trends and actual relevant threats. The s
trength of the Internet Storm Center is its group of handlers\, who are ne
twork security practitioners tasked with securing real networks just like
you. This is your chance to meet some of them in person.

\n

5% OFF Any SANS
Course! Any Format!\nUse Coupon Code: EHN5_SANS

\n

Each evening\, the ISC handlers will share the
ir most interesting experiences about the newest cyber hazards. These spec
ial presentations are free to everyone who pays for a course at SANSFIRE 2
014. Some of this year’s highlights include a talk by ISC handler Rob Vand
enBrink on Consulting from a Virtual Island\; Adrien de Beaupre will prese
nt\, Bust a Cap in a Web App With ZAP\; Russ McRee will discuss\, C3CM Def
eating the Command\, Control\, and Communications of Digital Assailants\;
Manuel Humberto Santander Pelez\, will talk about\, Avoiding Cyberterroris
m threats inside electrical substations. Dr. Johannes Ullrich\, ISC Direct
or and Marcus Sachs\, ISC Director Emeritus will lead a State of the Inter
net Panel Discussion.

\n

SANSFIRE 2014 hosts world-class instructors
teaching top-quality SANS courses covering penetration testing and hacker
exploits\, security\, management\, wireless\, forensics\, secure coding\,
and much more. We also have one- and two-day courses to round out your tra
ining\, which will be available at a steeply discounted price if taken wit
h a five- or six-day course.

\n

All SANS courses directly address the
kinds of incidents reported by the Internet Storm Center in their daily d
iaries. And\, it’s a SANS promise that what you learn you’ll be able to ap
ply immediately back at the office.

26th Annual FIRST Confe
rence 2014

\n

The Forum of Incident Response and Security Te
ams (FIRST) is a global non-profit organization dedicated to bringing toge
ther computer security incident response teams (CSIRTs) and includes respo
nse teams from over 240 corporations\, government bodies\, universities an
d other institutions spread across the Americas\, Asia\, Europe and Oceani
a. The annual FIRST conference provides a setting for conference
participants to attend a wide range of presentations delivered by leading
experts in both the CSIRT field and from the global security community. Th
e conference also creates opportunities for networking\, collaboration\, a
nd sharing technical information and management practices. The conference
enables attendees to meet their peers and build confidential relationships
across corporate disciplines and geographical boundaries. FIRST conferenc
e participants include not only CSIRT staff\, but also IT managers\, netwo
rk and system administrators\, software and hardware vendors\, law enforce
ment representatives\, security solutions providers\, telecommunications o
rganizations\, ISPs\, and general computer and network security personnel.
The FIRST Annual Conference covers a broad range of security related topi
cs such as (but not limited to):

Shared views\, experiences\, and resolutions in the co
mputer security incident response field

\n

\n

The confe
rence runs from Monday through Friday with registration starting at 14:00
on Sunday and includes a Sunday evening welcome reception to kick off the
week. Each day begins with a keynote address and is followed by one or mor
e invited speakers. The presentations that follow – Special Interest Group
s (SIGs) and panel sessions are split into three tracks:

Case Studies—lessons lear
ned in dealing with real events\, from discovery to remediation. Share pra
ctical experiences in dealing with cyber incidents along with the tools th
at provided most valuable.

\n

Special Interest Group (SIG) Meetings—providing a forum where FIRST members c
an discuss topics of common interest to the Incident Response community.
li>\n

Lightning Talks—Attendees are welcome to sign-up
first-come\, first-served and present to their peers in the main ballroom
at scheduled times.

\n

Vendor Showcase—special Tu
esday evening event showcasing FIRST vendors and attendees to network in a
relaxed setting with beverages and appetizers.

Hack In Paris 2014

\n

Intrusi
on attempts are more and more frequent and sophisticated\, regardless of t
heir targets (states or corporations).\nIt’s in this context that in
ternational hacking events are multiplying. A few events take place in Fra
nce\, but until now\, no one had covered hacking practices with a technica
l approach including both professional training and information aspects.
p>\n

It is this gap that Hack In Paris aims to fill. After the success o
f last year\, with more than 400 attendees\, this 5 days
corporate event will be held for the fourth time in France\, at the Conference Center of Disneyland Paris. Hack In Paris will let i
ts attendees discovering the concrete reality of hacking\
, and its consequences for companies. The program includes the sta
te of the art of IT security\, industrial espionage\, penetration testing\
, physical security\, forensics\, malware analysis and countermeasures.

\n

Hack In Paris will be held from 23rd to 27th of Jun
e 2014 at the Conference Center of Disneyland Paris.

\n

\n<
li>June 23 to 25 : three days of trainings by 10
security officers (CISOs\, CIOs) and technical experts\n

June
26 to 27: two days of talks given by a variety of i
nternational speakers and highly technical experts

\n

\n

Organizer

\n

Sysdream is a French leading provider of IT security audits and
security training. Sysdream is born to satisfy a growing need of competenc
e transfer and audits (penetration testing) from the attacker point of vie
w (offensive security or ethical hacking) for companies with an important
security need.

OWASP A
ppSec Europe 2014

AppSec Europe is returning to the United Kingdom in 2
014\, from the 23rd to the 26th of June. Hosted in Cambridge at Anglia Rus
kin University\, conveniently located near the “Silicon Fen” of Cambridge\
, the leading Tech Hub in Europe\, and near the historical centre of Cambr
idge\, the conference planning team are hard at work to bring you:

OWASP has a strong open and global co
mmunity with more than 45\,000 participants\, more than 65 organizational
supporters and over 60 academic supporters via 200 local chapters across 6
continents in 117 countries.Access to representatives from major financia
l Services\, Insurance\, eComerece\, Retail\, and Government • World renow
ned speakers and experts

In addition
to the conference and training sessions\, numerous activities are also pl
anned including Women in AppSec\, The University Challenge\, OWASP Project
Summit and much more.

\n\n

OWASP AppSec conferences bring together industry\, go
vernment\, security researchers\, and practitioners to discuss the state o
f the art in application security. This series was launched in the United
States in 2004 and Europe in 2005. Global AppSec conferences are held annu
ally in North America\, Latin America\, Europe\, and Asia Pacific. Additio
nally\, regional events are held in locations such as Brazil\, China\, Ind
ia\, Ireland\, Israel\, and Washington D.C. Presentations and videos are g
enerally posted several months after each conference.

REcon 2014

REcon is a computer security conference with a focus on reverse e
ngineering and advanced exploitation techniques. It is held annually in Montreal\, Canada.

\n

The conference off
ers a single track of presentations over the span of three days along with
technical training sessions held before the presentation dates. Technical
training varies in length between two and four days.

\n

The registra
tion fee includes an access pass to the conference as well as lunch
\, and coffee breaks for all three days of th
e conference. Provincial and federal sales taxes will be applied to all re
gistration fees. All registration fees are payable in Canadian dollars (CAD).

DigitalSec2014

\n

You are invited to participate in <
strong>The International Conference on Digital Security and Forensics (Dig
italSec2014) that will be held at VSB-Technical Universit
y of Ostrava\, Czech Republic on June 24-26\, 2014. The event wil
l be held over three days\, with presentations delivered by researchers fr
om the international community\, including presentations from keynote spea
kers and state-of-the-art lectures.

BSidesManchester 2014

\n

Details for B
SidesManchester 2014 will be posted when available.

\n\n

What is BSides?

\n

Each BSides is a community-driven framework for buildin
g events for and by information security community members. The goal is t
o expand the spectrum of conversation beyond the traditional confines of s
pace and time. It creates opportunities for individuals to both present a
nd participate in an intimate atmosphere that encourages collaboration. It
is an intense event with discussions\, demos\, and interaction from parti
cipants. It is where conversations for the next-big-thing are happening.
p>\n

BSides’s History

\n

BSides was born out of number of rejecti
ons to the CFP for Black Hat USA 2009. A number of quality speakers were r
ejected\, not due to lack of quality but lack of space and time. Any const
rained system must operate within the bounds to which it has defined itsel
f. Conferences constrain themselves to the eight hours a day for however m
any days they run. Our goal is to provide people with options by removing
those barriers and providing more options for speakers\, topics\, and even
ts.

\n

Much like Noisebridge\, and other hacker spaces\, we are a do-
acracy\; in other words\, if you want it\, then you do to it or make it ha
ppen. We do not have members\, but rather participants. You are the “we” a
nd we can only be successful if you make that happen for yourself.

SANS Capital City 2014

\n

Make your plans now to attend
SANS Capital City 2014 this July and use what you learn in the classroom
as soon as you return to the office. Visit our Schedule page for complete
course descriptions for all of the courses.

\n

5% OFF Any SANS Course! Any
Format!\nUse Coupon Code: EHN5_SANS
span>

\n

Several courses taken at Capital City 2014 are associated w
ith a GIAC Certification attempt. Put the skills you’ll learn to practical
use and join GIAC certified professionals who make the Cybersecurity indu
stry safe! Visit the GIAC Page for more information and register for your
certification attempt today!

\n

Earn your Master’s Degree at the newl
y accredited SANS Technology Institute (STI)! Start taking courses at SANS
Capital City 2014 that will apply to the STI Master’s Program upon admitt
ance. Take classes in Information Security Management (MSISM) or Engineeri
ng (MSISE). See SANS Technology Institute page for more information. Apply
today!

\n

SANS training is well known for being relevant and pragmat
ic. Our award-winning faculty has proven they understand the challenges yo
u face on a daily basis. Their real-world experience increases the practic
al value of the course material.

BSidesDetroit 2014<
/h1>\n

BSidesDetroit: Facilitating the Security Conversation

\n

B
Sides Detroit is the Saturday after Converge Detroit. Havi
ng a BSides conference in Detroit is about bringing people from all over t
o Detroit\, to talk about technical and non-technical topics\, to educate
and advance the industry in a location that has a relatively large number
of IT and security professionals and students who call it home.

\n

Pa
rticipants. BSides Detroit brings the unconference style to information se
curity meet-ups. BSides is about making a conference of\, by\, and for the
participants. Above all\, though\, we aim to create community\, and to fa
cilitate networking.

\n

Speakers. We like speakers\, specifically new
and local speakers\, not necessarily the people who are all over every ot
her conference. We like content\, specifically new and emerging content\,
and not necessarily the stuff that is all over the media. BSides Detroit
is about sharing material frankly\, honestly\, and directly\, for the purp
ose of informing\, educating\, and continuing the conversation.

\n

Sp
onsors. BSides Detroit’s structure creates a higher degree of engagement.
Sponsoring takes your message beyond the vendor booths. BSides Detroit tak
es your engagement beyond passing out swag\, goodies\, and tchotchkes. Our
sponsors send technical staff and thought leaders who discuss real world
problems and offer practical solutions. Be prepared to be a part of the co
nference\, sharing ideas\, meeting people\, and interacting with the local
community. Be prepared to be blown away by BSides Detroit.

Org
anizers

What is BSi
des?

\n

Each BSides is a community-driven framework for bui
lding events for and by information security community members. The goal
is to expand the spectrum of conversation beyond the traditional confines
of space and time. It creates opportunities for individuals to both prese
nt and participate in an intimate atmosphere that encourages collaboration
. It is an intense event with discussions\, demos\, and interaction from p
articipants. It is where conversations for the next-big-thing are happenin
g.

SANS San Francisco 2014

You are invited to attend anot
her great SANS training event in “The City by the Bay.” SANS San Francisco
2014 will be in the heart of the city at the Hilton San Francisco Union S
quare campus.

\n

5% OFF Any SANS Course! Any Format!\nUse Coupon Code
: EHN5_SANS

\n

A few courses a
re in alignment with DoD Directive 8570 requirements for Baseline IA Certi
fications. Several courses also have GIAC Certification attempts available
. See the GIAC homepage for more information.

\n

Register by May 21 a
nd save $400 on tuition fees. You’ll see why SANS is the most trusted sour
ce in computer security training\, certification\, and research. SANS trai
ning is well-known for being relevant and pragmatic. All SANS instructors
are industry leaders who have proven they understand the challenges you fa
ce on a daily basis. Their real-world experience increases the practical v
alue of the course material.

RSA Conference Asia Pacific & Japan 2014

Hundr
eds of game-changing interactions will give you an unparalleled diversity
of industry insight and information based on best practices\, real impleme
ntation stories\, and detailed case studies. Each year\, educational sessi
ons feature new and returning educational tracks you won’t find anywhere e
lse\, including:

\n

\n

The Human Element

\n

Security Mashu
ps

\n

CISO Viewpoints

\n

\n

Year after year\, RSA Confere
nces attract the best and the brightest minds in the information security
field across multiple industries to discuss and share knowledge with the c
ommunity. And more than 80% of 2013 attendees agree: RSA Conferences stand
s at the forefront as the leading event in the security industry.

\n

About RSA Conference

\n

RSA Conference is helping drive the informa
tion security agenda worldwide with annual industry events in the U.S.\, E
urope and Asia. Throughout its history\, RSA Conference has consistently a
ttracted the world’s best and brightest in the field\, creating opportunit
ies for conference attendees to learn about IT security’s most important i
ssues through first-hand interactions with peers\, luminaries and emerging
and established companies. As the IT security field continues to grow in
importance and influence\, RSA Conference plays an integral role in keepin
g security professionals across the globe connected and educated.

\n

RSA developed RSA Conference in 1991 as a forum for cryptographers to gath
er and share the latest knowledge and advancements in the area of Internet
security. Today\, RSA Conference and related RSA Conference branded activ
ities are still managed by RSA\, with the support of the industry. RSA Con
ference event programming is judged and developed by information security
practitioners and other related professionals.

SANS Boston 2014

\n

You are invited to take SANS exceptional training when we return
to Boston this July with an awesome training lineup on July 28-August 2.
We are bringing two new forensics courses and a web application security e
ssentials course along with our top courses and best instructors who will
ensure that you not only learn the material\, but that you can apply it im
mediately when you return to the office.

\n

5% OFF Any SANS Course! Any For
mat!\nUse Coupon Code: EHN5_SANS

\n

Put the skills you’ll learn to practical use and join nearly 5
6\,000 GIAC certified professionals who make the IT security industry safe
! Visit the
GIAC page for more information\, and register for your certification
attempt today.

With a reputation for being the most trusted source for informa
tion security training and an eagerness to help you meet your training obj
ectives\, SANS is the best choice for IT security education. Don’t miss th
is special SANS training event in Boston this July! We hope to see you the
re.

Black Hat USA 2014

\n

Bla
ck Hat USA is the show that sets the benchmark for all other security conf
erences. As Black Hat returns for its 17th year to Las Vegas\, we bring to
gether the brightest in the world for six days of learning\, networking\,
and skill building. Join us for four intense days of Trainings and two jam
-packed days of Briefings.

\n

Use Coupo
n Code TDCCbr100off\nfor $100 Off Briefings Tickets

\n

Blac
k Hat USA 2014 Features

\n

Briefings

\n

The Black Hat Briefings have become the most important security
conference series in the world by sticking to our core value: serving the
information security community by delivering timely\, actionable security
information in a friendly\, vendor-neutral environment.

Business Hall

\n

Featuring more than 150 of the industry’
s top solution providers and start-ups showcasing the latest tools\, techn
ologies and services supporting the security community. From the new start
-up Innovation City to the attendee networking lounge and business center\
, the 2014 Business Hall Brings more oppor
tunities for attendees\, vendor and community engagement.

\n\n

\n

Black Ha
t is the most technical and relevant global information security event ser
ies in the world. For more than 16 years\, Black Hat has provided attendee
s with the very latest in information security research\, development\, an
d trends in a strictly vendor-neutral environment. These high-profile glob
al events and Trainings are driven by the needs of the security community\
, striving to bring together the best minds in the industry. Black Hat ins
pires professionals at all career levels\, encouraging growth and collabor
ation among academia\, world-class researchers\, and leaders in the public
and private sectors.

\n

From its inception in 1997\, Black Hat has g
rown from a single annual conference in Las Vegas to the most respected in
formation security event series internationally. Today\, the Black Hat Bri
efings and Trainings are held annually in the United States\, Europe and A
sia\, providing a premier venue for elite security researchers and trainer
s to find their audience.

\n

What We Do

\n

Review Board + Con
tent Selection

\n

The Black Hat Review Board is comprised of 23 of t
he industry’s most credible and distinguished security professionals and t
hought leaders throughout various areas of the information security commun
ity. The Review Board advises Black Hat on its strategic direction\, revie
wing and programming conference content and providing unparalleled insight
into the research community. You can find more information on the Review
Board here: https://www.blackhat.com/review-board.html

\n

Black Hat s
trives to deliver one of the most empirical content selection processes in
the industry. All submissions are vetted thoroughly by the Black Hat Revi
ew Board. Each submission is reviewed for uniqueness\, overall content exp
ertise and accuracy before any selections are made. Through the course of
this dynamic review process\, Black Hat Review Board members will frequent
ly ask researchers for clarity on any areas of question in their submissio
ns – whether it be about the uniqueness or audacity of claims made. The be
st submissions come with academic-grade papers\, proof-of-concept code and
/or video demonstrations of the work done. Of note\, Black Hat does not su
pport pay-for-play Briefings. The Black Hat Briefings are and always have
been independently selected based on quality of content and area of expert
ise rather than sponsorship.

\n

Attracting Top Talent and Research
h3>\n

Black Hat provides a premier venue for elite security researchers
and trainers to find their audience. Here\, researchers can share can shar
e their latest insights and findings while at the same time gaining value
and perspective from the other bright minds at the show. Black Hat has par
tnered with the Electronic Frontier Foundation (EFF) to provide pro-bono l
egal consultations to security researchers on-site. Black Hat and EFF are
dedicated to defending free speech and privacy rights to facilitate the bo
undary-pushing research and vulnerability disclosure that attendees have c
ome to know and love at each annual show.

BSidesLV 2014

\n

Unlike several years prior\, whe
re we offered pre-registration for a token refunded fee\, this year\, ther
e will be no pre-reg. Badges will be offered days of show on a first-come\
, first-served\, walk-in basis. You can secure a badge ahead of the confer
ence in several ways: Become a donor\, a speaker\, a mentor\, a sponsor\,
a volunteer\, or get a room!

\n

BSidesLV is one of the hottest names
in InfoSec!

\n

We have an amazing array of speakers each year\, cover
ing topics such as Penetration Testing\, Forensics\, Incident Response\, R
isk\, and everything in between. We have a Lockpick Village\, the Squirrel
s in a Barrel World Championship Social Engineering Capture The Flag\, unc
ensored talks\, and proximity to the other big InfoSec conferences in the
world.

\n

BSidesLV is the place where the conversations about the “Ne
xt Big Thing” happen first.

\n

This year\, BSidesLV will consist of f
our main speaking tracks\, one math track\, and one workshop track. We’re
also teaming up with PasswordsCon. They will be co-locating with us\, brin
ging you 2-for-1 conference action – all for the low\, low price of FREE!!

\n\n

What is BSides?

\n

BSides Las Vegas is an Information / Security con
ference that’s different. We’re a 100% volunteer organized event\, put on
by and for the community\, and we truly strive to keep information free.
p>\n

There is no charge to the public to attend BSidesLV. Our costs are
covered by our generous donors and sponsors\, who share our vision of free
dissemination of information. The conversations are getting more potent a
nd the “TALK AT YOU” conferences are starting to realize they have to chan
ge. BSidesLV is making this happen by shaking-up the format.

\n

The
next big thing

\n

Presenters at our conference are engaging our part
icipants and getting the discussions started on the “Next Big Thing”\, not
preaching at you from the podium about last month’s news.

\n

With tr
acks as diverse as “Common Ground”\, focusing on non-tech issues of import
ance to the community\, “Underground”\, our Off-The-Record series that let
s you delve deeper into the subjects that are better-off discussed Away-Fr
om-Keys\, behind closed doors\, and “Proving Ground”\, our mentorship prog
ram for first-time presenters\, YOU are the reason for this new era of Inf
ormation Sharing and Teamwork.

\n

Raising the bar for security

\n

The BSides community has continuously raised the bar and put the INFO
back in INFOSEC. We thank each and every member/attendee/organizer of thi
s community for their hard work\, sweat\, and relentless pursuit of High Q
uality information.

\n

We also have to give a HUGE amount of thanks t
o our generous sponsors and donors that have the foresight to give without
strings attached\, year after year\, and PROVE to the community that we a
re all in this together. In concert\, the members\, sponsors and donors ha
ve allowed for us all to get together and make moves to change InfoSec…. o
ne chat\, speech\, laugh\, and/or drink at a time.

\n

With some of th
e most passionate and influential infosec practitioners from around the co
untry\, and the world\, coming to Vegas\, BSidesLV is the place to be. The
mix ranges from “down in the trenches” engineers\, to business leaders\,
thought leaders\, and executive decision makers of all stripes.

Passwords14

\n

A hacker conference that’s all about passw
ords\, PIN codes\, and digital authentication.

\n

Passwords are the
most prevalent form of authentication in the digital age\, and are the fir
st line of defense against unauthorized access in most systems. Even if yo
u are using some other form of authentication for a particular service\, t
here’s still a password in the chain somewhere — it all comes back to rely
ing on something somewhere being password-protected. But after 50 years of
computing evolution\, 123456 and password still top the list of most freq
uently used passwords. And nearly a half billion passwords have been compr
omised over the last five years alone\, including breaches from companies
such as Adobe\, Twitter\, Forbes\, LinkedIn\, Yahoo\, and LivingSocial. Cl
early\, we have a systemic problem with password authentication – and it’s
not going away any time soon.

\n

Passwords is the first and only con
ference of its kind\, where leading researchers\, password crackers\, and
experts in password security from around the globe gather in order to bett
er understand the challenges surrounding digital authentication\, and how
to adequately address them. While large mainstream conferences tend to foc
us on current hot topics in the information security industry\, Passwords
events explore fringe conversations on everything from analysis and educat
ion to creating\, securing\, cracking\, and exploiting authentication solu
tions. And unlike other events where the speaker is rushed in and out\, Pa
sswords provides an intimate environment for participants to directly enga
ge speakers before\, during\, and after their presentations.

\n

Passw
ords was launched in Bergen\, Norway in 2010\, motivated by dissatisfactio
n with the robustness and usability of current authentication solutions. N
ow in its fifth year\, Passwords is held twice a year on two continents\,
and Passwords14 Las Vegas marks the 7th global event. Participation has do
ubled at each event over the past three years\, and we are anticipating pa
rticipation more than doubling in 2014 due to our partnership with Bsides
Las Vegas.

DEF CON 22

\n

Details posted when available. In the mean
time\, check out DEF CON 21.

\n

\n

The DEF CON Story
h2>\n

\n

Originally started in 1993\, it was a meant to be a party
for member of “Platinum Net”\, a Fido protocol based hacking network out o
f Canada. As the main U.S. hub I was helping the Platinum Net organizer (I
forget his name) plan a closing party for all the member BBS systems and
their users. He was going to shut down the network when his dad took a new
job and had to move away. We talking about where we might hold it\, when
all of a sudden he left early and disappeared. I was just planning a party
for a network that was shut down\, except for my U.S. nodes. I decided wh
at the hell\, I’ll invite the members of all the other networks my BBS (A
Dark Tangent System) system was a part of including Cyber Crime Internatio
nal (CCI)\, Hit Net\, Tired of Protection (ToP)\, and like 8 others I can’
t remember. Why not invite everyone on #hack? Good idea!

SANS San Antonio 2014

\n

We are pleased to invite you to attend
SANS San Antonio 2014 on August 11-16 at Westin Riverwalk campus located on the banks of the Sa
n Antonio River Walk. We have our top information security courses selecte
d to provide you with the training and certification that you need to boos
t your career by learning from the best! SANS Instructors are industry pro
fessionals who will ensure that you not only learn the material\, but that
you will also be able to apply what you learn your first day back in the
office.

\n

5% OFF Any SANS Course! Any Format!\nUse Coupon Code: EHN5_SANS

\n

With a reputation for
being the most trusted source for information security training and an ea
gerness to help you meet your training objectives\, SANS is the best choic
e for IT security education. Don’t miss this special SANS training event i
n San Antonio this August! We hope to see you there.

SANS Cyber Defense Summit 2014

\n

Prevent –> Detect –>
Respond… A Winning Formula for Cyber Defense!

\n

P
reventing the adversary from compromising an organization’s critical infor
mation assets and business systems is crucial\, and we can’t lose sight of
that goal. However\, the reality is that no barrier is impenetrable. Dete
ction and response represent critical lines of cyber defense. The Cyber De
fense Summit in Nashville marks the first time that SANS will conduct a tr
aining event and Summit that brings together cyber defense practitioners f
ocused on defensive tactics as opposed to offensive-minded approaches to t
hwart attackers and prevent intrusions.

\n

5% OFF Any SANS Course! Any Form
at!\nUse Coupon Code: EHN5_SANS

\n

Led by top SANS instructors\, this event offers technical cours
es that will teach you the essential skills and techniques needed to play
winning defense to protect and secure your organization. The courses are f
illed with intense\, hands-on learning to enhance and hone your defensive
skills. You’ll be able to use what you learn immediately upon returning to
work–the hallmark of SANS training.

\n

The SANS Cyber Defense Summit
brings together all the key players in the field responsible for protecti
ng and securing organizational assets and data from the consistent and per
sistent threats of offensive-minded attackers/hackers. Security experts wi
ll share real-life success stories and a range of best practices–remember\
, no one size fits all\, and there many ways to approach and play winning
defense. You will walk away with the key principles behind the winning for
mula and the ability to apply that formula immediately to the specific cha
llenges your organization faces.

\n

After you’ve heard all the securi
ty experts\, enjoy a visit to the Country Music Hall of Fame to see all th
e stars that shaped country music! Or mosey on down to the Wildhorse Saloo
n to learn how to line dance!

\n

The Cyber Defense Summit is a must-a
ttend event. Don’t miss this opportunity to learn the formula for playing
winning defense! Save the dates in August! We’ll see you in Nashville!

\n

What Will You Learn?

\n

\n

Why attacks are
successful: how the attacker kill chain works and the methods used for byp
assing the defense

\n

Why organizations are being compromised: comm
on failure points in current approach/solutions

\n

How to implement
multi-tiered defensive solutions that properly protect an organization\n

How to communicate with executives: providing metrics that show th
e effectiveness of security

\n

Building a security playbook: the ke
y pros and cons of building a proper framework for defense

SANS Virginia Beach 2014

\n

You are invited to atten
d SANS Virginia Beach 2014\, which continues to be one of our most popular
locations! In the past\, we have had sold-out courses\, and an extra week
of training means we may not have to turn anyone away. Choose from top-ra
ted SANS IT security\, security management\, and computer forensics course
s and use what you learn in the classroom as soon as you return to the off
ice.

\n

5% OFF Any SANS Course! Any Format!\nUse Coupon Code: EHN5_SANS

Courses taken at Virginia Beach are associated
with a GIAC Certification attempt. Put the skills you’ll learn to practic
al use and join more than 56\,000 GIAC certified professionals who make th
e Cybersecurity industry safe! Visit the GIAC Page (http://www.giac.org/)
for more information and register for your certification attempt today!

SANS training is well known
for being relevant and pragmatic. Our award-winning faculty (SC Magazine’
s Best Profession Training for 2014) has proven they understand the challe
nges you face on a daily basis. Their real-world experience increases the
practical value of the course material

BSidesMSP 2014

\n

Engaged\, Happy Hac
kers\, Protecting Planet Earth!

\n

The event will have a keynote pre
sentation followed by two rooms of focused presentations throughout the re
st of the day.

\n

Following with our goal of helping the local inform
ation security community become more self-supportive\, we have structured
the process to support both experienced and novice speakers. We also recog
nize that many people may have the seeds of a good talk\, but need to boun
ce the ideas around a bit before it’s fully fleshed out. Thus\, different
time slots are also available.

\n

To truly succeed\, we need your hel
p. Please sign up for the CFP. If you’ve never done a presentation before\, we
can give you some help. If you’re experienced\, we’ll get out of your way.

\n

If you want to brainstorm on ideas before you submit\, please con
tact me via Twitter\, and I’ll gladly help you out.

\n

<
strong>BSidesMSP 2014 is:

\n

\n

A free security conferen
ce for hackers by hackers\, in the Upper Midwest by Midwesterners.

\n<
li>Why? Why not. Because\, Minnesota Nice.\n

Engaged\, Happy Hacke
rs\, Protecting Planet Earth

\n

\n\n

What is BSides?

\n

Each BSides is a community-driven framework for building events for a
nd by information security community members. The goal is to expand the s
pectrum of conversation beyond the traditional confines of space and time.
It creates opportunities for individuals to both present and participate
in an intimate atmosphere that encourages collaboration. It is an intense
event with discussions\, demos\, and interaction from participants. It is
where conversations for the next-big-thing are happening.

\n

BSides
’s History

\n

BSides was born out of number of rejections to the CFP
for Black Hat USA 2009. A number of quality speakers were rejected\, not
due to lack of quality but lack of space and time. Any constrained system
must operate within the bounds to which it has defined itself. Conferences
constrain themselves to the eight hours a day for however many days they
run. Our goal is to provide people with options by removing those barriers
and providing more options for speakers\, topics\, and events.

\n

Mu
ch like Noisebridge\, and other hacker spaces\, we are a do-acracy\; in ot
her words\, if you want it\, then you do to it or make it happen. We do no
t have members\, but rather participants. You are the “we” and we can only
be successful if you make that happen for yourself.

Ha
k4Kidz 2014

\n

Hak4Kidz is the first official youth based ethical ha
cking conference in Chicago that is *not* a hackathon.

\n

Hak4Kidz is
an event by ethical hackers and Information Security professionals dedica
ted to bring the educational and communal benefits of hacking conferences
to children and young adults. We plan to accomplish this mission by puttin
g our collective expertise and passion on display for the attendees to int
eract with us at their will. A combination of youth base speaking tracks c
omplementing an open area of stations will enable the attendees to expand
and enlighten their technical interests. For innovation to perpetuate\, it
’s imperative that today’s young users are exposed to the bigger picture o
f how we got here and to help realize their potential.

\n

About Us
h2>\n

Hak4Kidz is an event of ethical hackers and Information Security p
rofessionals dedicated to bring the educational and communal benefits of h
acking conferences to children and young adults. We plan to accomplish thi
s mission by putting our collective expertise and passion on display for t
he attendees to interact with us at their will. A combination of youth bas
e speaking tracks complementing an open area of stations will enable the a
ttendees to expand and enlighten their technical interests. For innovation
to perpetuate\, it’s imperative that today’s young users are exposed to t
he bigger picture of how we got here and to help realize their potential.<
/p>\n

Hak4Kidz operates under the legal banner of SecureChicago. SecureC
hicago an established organization dedicated to the Information Security c
ommunity of Chicago. The purpose of this organization is to:

\n

\nFacilitate discussion\, debate\, and dialogue over Information Security
issues in friendly and open atmosphere where individuals feel free to spea
k their personal views\n

Provide high quality low cost events for
enthusiast and practitioners in the various domains in Information Securit
y

\n

Foster\, promote\, and encourage careers in the area of Inform
ation Security by supporting the community through various means

\n\n

SecureChicago is the entity that organizes great events such as BSi
desChicago. Several experienced volunteers from BSidesChicago will be volu
nteering with the Hak4Kidz conference.

SANS Chicago 2014

\n

We are pleased to invite you to the Palmer House in downtown Chicago
– our campus for SANS Chicago 2014 this August. We are bringing our top-r
ated courses for your training needs. Taught by SANS top instructors\, thi
s event offers an opportunity to learn\, network\, and practice career-boo
sting hands-on skills in a more intimate setting.

\n

5% OFF Any SANS Course
! Any Format!\nUse Coupon Code: EHN5_
SANS

\n

Many of the courses are associated with a GIA
C Certification. Complete your SANS training experience with a GI
AC certification attempt\; put the skills you’ll learn to practical use an
d join more than 57\,000 GIAC certified professionals who make the infosec
industry safe. Visit the Certification links (http://www.giac
.org) on the main page for more information and to register for your c
ertification attempt today.

BS
idesHyderabad 2014

\n

The goal of BSidesHyderabad is to mash up the
security community with the best open thinkers from around the world in th
e famous SecurityBSides open\, interactive and community oriented format.
This is a collaborative event – for all of us\, by all of us. The only t
hing we ask of you is to participate. Come and talk\, speak up\, ask ques
tions and participate throughout the event. It is a time for all of us to
learn\, share and explore without judgment\, and to inspire those around
us.

\n

Volunteers! Sponsors! We need sponsors\, wranglers\, handlers
\, speakers\, nuts\, looneys\, the sane\, and those of you that are somewh
ere in-between to all throw in a hand. Because we want to do everything BI
G.

\n\n

\n

What is BSides?

\n

Each BSides is a com
munity-driven framework for building events for and by information securit
y community members. The goal is to expand the spectrum of conversation b
eyond the traditional confines of space and time. It creates opportunitie
s for individuals to both present and participate in an intimate atmospher
e that encourages collaboration. It is an intense event with discussions\,
demos\, and interaction from participants. It is where conversations for
the next-big-thing are happening.

\n

BSides’s History

\n

BSide
s was born out of number of rejections to the CFP for Black Hat USA 2009.
A number of quality speakers were rejected\, not due to lack of quality bu
t lack of space and time. Any constrained system must operate within the b
ounds to which it has defined itself. Conferences constrain themselves to
the eight hours a day for however many days they run. Our goal is to provi
de people with options by removing those barriers and providing more optio
ns for speakers\, topics\, and events.

\n

Much like Noisebridge\, and
other hacker spaces\, we are a do-acracy\; in other words\, if you want i
t\, then you do to it or make it happen. We do not have members\, but rath
er participants. You are the “we” and we can only be successful if you mak
e that happen for yourself.

ArchC0N 2014

\n

Please join us for the inaugural ArchC0N co
nference in Saint Louis\, MO. We are a non-profit group looking to help ed
ucate and collaborate with some of IT Security’s brightest minds. The focu
s of the event is on quality and not quantity\, as the information securit
y community doesn’t need another mega conference filled with silver bullet
s and snake oil. You can expect a small\, casual atmosphere with great net
working\, industry leading speakers\, and a most excellent after party.

SANS Albuquerque 2014

\n

You are invited attend SANS new trai
ning event in Albuquerque NM on September 15-20. Why not get your IT secur
ity\, pen testing\, incident handling\, and forensics training in a more i
ntimate setting at SANS the new event in Albuquerque? We are bringing both
entry-level and advanced training to provide the perfect training event f
or you!

\n

5% OFF Any SANS Course! Any Format!\nUse Coupon Code: EHN5_SANS

\n

Put the skills you’ll
learn to practical use and join more than 57\,500 GIAC certified professi
onals who make the IT security industry safe! Visit the GIAC Page (h
ttp://www.giac.org) for more information\, and register for your certi
fication attempt today.

With a reputation for be
ing the most trusted source for information security training and an eager
ness to help you meet your training objectives\, SANS is the best choice f
or IT security education. Don’t miss this special SANS training event in A
lbuquerque this September! We hope to see you there.

OWASP AppSec USA 2014

\n

AppSec USA is a world-class software security conference for develope
rs\, auditors\, risk managers\, technologists\, and entrepreneurs gatherin
g with the world’s top practitioners to share the latest research and prac
tices\, in the high energy atmosphere of Downtown Denver.

\n

Events
at OWASP AppSec USA 2014

\n

With Denver’s beautiful scenery\, the Mi
le High City will surely make your experience just as memorable! These are
just a few of the activities that we have planned so far. As our event ne
ars\, we’ll have more for you to look forward to!

\n

\n

Project S
ummit – Do some hands on work on one of our featured OWASP Projects: AppSe
nsor\, Code Review Guide\, Testing Guide\, Development Guide\, Open SAMM\,
ESAPI\, or ZAP

Chapter Leader Workshop – OWAS
P Chapters are one of the core building blocks of the organization and the
se sessions are a place for discussion on some of the common problems and
questions that arise in running a chapter.

WHO SHOULD ATTEND?

OWASP AppSec conferences bring together industry\, government
\, security researchers\, and practitioners to discuss the state of the ar
t in application security. This series was launched in the United States i
n 2004 and Europe in 2005. Global AppSec conferences are held annually in
North America\, Latin America\, Europe\, and Asia Pacific. Additionally\,
regional events are held in locations such as Brazil\, China\, India\, Ire
land\, Israel\, and Washington D.C. Presentations and videos are generally
posted several months after each conference.

SANS Ba
ltimore 2014

\n

You are invited to Maryland for SANS Baltimo
re 2014 this September. Now more than ever\, hands-on\, immersion
information security training experience will set you apart from others i
n the field. So\, register today for SANS Baltimore 2014
and get the best computer security training money can buy.

\n

5% OFF Any SA
NS Course! Any Format!\nUse Coupon Code: EHN5_SANS

\n

Many of our courses in IT audit\, IT securit
y\, computer forensics\, and security management are associated with GIAC certi
fications for managers and technical staff alike. GIAC is nearing 58\,
000 certified professionals who keep the Cybersecurity industry safe. Your
GIAC certification can serve as proof that you can put the skills you’ll
learn to practical use to protect your organization’s assets.

\n

Our
cutting-edge courses have been selling out\, so don’t miss the opportunity
to take one of them at this event.

\n

When you attend SANS Baltimore
2014\, you will see the SANS promise in action – what you learn in the cl
assroom you will be able to use immediately upon returning to the office.
With a reputation for being the most trusted source for information securi
ty training and an eagerness to help you meet your training objectives\, S
ANS is the best choice for IT security education. So let your colleagues a
nd friends know about SANS Baltimore 2014. We look forwar
d to seeing you all!

DerbyCon 4.0

\n

Welcome to DerbyCon 4.0 – “Family Rootz”. Th
is is the place where security professionals from all over the world come
to hang out. DerbyCon 4.0 will be held September 24-28th\, 2014. DerbyCon
2013 pulled in over 2\,000 people with an amazing speaker lineup and a fam
ily-like feel. We’ve listened to your feedback and plan on making this con
ference even better this year.

\n\n

\n

At DerbyCon 3.0\, the secur
ity community raised over $30\,000 for the Hackers for Charity foundation\
, over double that of other conferences. This is just one example of the m
any amazing things that happened at the conference. We are about the INFOS
EC community and making it better.

\n\n

\n

Schedule and listing o
f Special Events will be posted when made available. In the meantime…

\n

CFP

\n

Want to speak at DerbyCon 4.0? Sweet! We want you to as
well.

\n

Call for papers (CFP) are now live! If you are accepted\, y
ou will receive a $200 honorarium for helping support the conference. We d
o NOT accept PDF documents and all submissions must go through the call fo
r papers system.

Call for papers will close at 1:00PM ET on August
15th\, 2014. Note that we select folks in waves\, if you wait until the la
st minute to submit your talk\, you will have a much lower probability of
being accepted.

(ISC)2 Security Congress 2014

\n

(ISC)² Se
curity Congress 2014 offers attendees over 80 education sessions\, designe
d to transcend all industry sectors\, focus on current and emerging issues
\, best practices\, and challenges facing cybersecurity leaders. As cyber
threats and attacks continue to rise\, the goal of (ISC)² Security Congres
s is to strengthen cybersecurity defenders by arming them
with the knowledge\, tools\, and expertise to protect their organizations
.

\n

(ISC)² members are eligible for special discounted pricing and w
ill have opportunities to attend exclusive member events\, including a net
working reception and town hall meeting.

Keynotes at ASIS 2014

\n

\n

Gov. Jon Huntsman\, Jr.

\n

General Colin L. Powell\, USA (Ret
.)

\n

Rear Admiral Scott Moore

\n

\n

Exhibit Hall at ASIS 2014

\n

\n

\n\n

Suc
ceed Today by Seeing Tomorrow

\n

Here’s where you’ll find the most i
nnovative technologies\, new products\, and services in the security marke
t today! Hundreds of companies are displaying the tools and information yo
u need to provide the best security for your organization. From access con
trol to cyber security to weapons detection\, ASIS 2014 is your best one-s
top show of the year!

\n

\n

Discover the hottest new products on
the market.

\n

Compare and evaluate innovations from top manufactur
ers\, integrators\, and service providers.

\n

Engage with solutions
experts for the information you need. Conduct a year’s worth of research
in just three days. Everything you need for enterprise-wide security is he
re at ASIS 2014.

\n

\n

Your FREE* exhibits registration<
/strong> includes admission to top name keynotes onTuesday and Wednes
day\, plus additional learning opportunities right on the show floor.

\n

Education at ASIS 2014

\n

\n

\n

\n

Open your eyes to new insights and solutions you can tak
e home and use right away. The comprehensive array of security’s hottest t
opics spanning across industries will provide the tactical ideas and inspi
ration you need to solve your toughest challenges.

SANS Seattle 2014

\n

We would like to welcome you to the Pacific Northwest for SA
NS Seattle 2014! We are bringing some of our top courses and inst
ructors to Seattle on September 29-October 6. Our instructors are experts
in this industry and are the best at ensuring you will not only learn the
material\, but that you can also apply it immediately when you return to t
he office.

Many of our courses at
SANS Seattle 2014 are associated with a GIAC Certification. Complete your SA
NS training experience with a GIAC certification attempt\; put the skills
you’ll learn to practical use and join more than 57\,500 GIAC certified pr
ofessionals who make the Cybersecurity industry safe.

\n

Some of the
courses at SANS Seattle 2014 will also be accepted as credit under the SAN
S Technology Institute Master’s degree program. Take classes in Informatio
n Security Management (MSISM) or Engineering (MSISE). Click here find out more. Appl
y today!

\n

With a reputation for being the most trusted source for i
nformation security training and an eagerness to help you meet your traini
ng objectives\, SANS is the best choice for IT security education. Don’t m
iss this special SANS training event in Seattle this October! We hope to s
ee you there.

MIRcon 2014

\n

The Mandiant Incident Response
Conference (MIRcon) offers participants the opportunity to hear from some
of the most influential voices in cybersecurity while networking with peer
s. Sessions at MIRcon will cover best practices\, case studies and instruc
tion on important aspects of the information security terrain\, including
incident response\, malware analysis\, reverse engineering and computer fo
rensics.

\n

Keynote Speakers at MIRcon 2014

\n

\n

\n

Dr
. Neil deGrasse Tyson

\n

\n

\n

Dr. Tyson is an astrophysicist with a broad range of professional research
interests including star formation\, exploding stars\, dwarf galaxies\, a
nd the structure of our Milky Way. Read More.

\n

\n

\n

Gen. Keith B. Alexander\, USA (Ret.)

With targeted attacks becoming more prevalent\, today’s incident responder
s are faced with the tremendous challenge of accelerating their response t
imes while capturing relevant data from attacks in progress.

\n

From
analysts to innovators to managers and executives the Mandiant Incident Re
sponse Conference is an excellent investment in your business and your pro
fessional development where you will earn about new technologies\, inciden
t response best practices\, and key strategies for managing network securi
ty.

\n

WHO SHOULD ATTEND

\n

With the opportunity to tailo
r your experience by choosing from both managerial and technical tracks to
suit specific needs and focus\, MIRcon 2014 provides value to any profess
ional looking to improve technology security effectiveness and efficiency
at all levels of the organization.

\n

WHAT YOU WILL LEARN

\n

Hundreds of experts and practitioners attend MIRcon each year to get
ideas and find answers to help them defend against sophisticated attackers
and learn what’s next on the cyber security horizon. Authorities on incid
ent response\, malware analysis\, reverse engineering and computer forensi
cs will be on hand to share experiences and approaches to benefit each att
endee. Professionals can expect high-value networking and peer-to-peer eng
agement. Participants will see new technology demonstrated and discuss ide
as and receive recommendations about how best to defend against and respon
d to sophisticated attackers.

Black Hat Europe 2014

\n<
p>The premier conference on information security returns to the beautiful
city of Amsterdam\, Netherlands in October\, 2014. Professionals from all
over the world gather for two days of intense Trainings and two thought-pr
ovoking days of Briefings brought to you by some of the brightest minds in
the industry.\n

Briefings

\n

The Black Hat Briefings have be
come the biggest and the most important security conference series in the
world by sticking to our core value: serving the information security comm
unity by delivering timely\, actionable security information in a friendly
\, vendor-neutral environment.

\n

Trainings

\n

Black Hat Europ
e 2014 is set to bring together the best minds in security to define tomor
row’s information security landscape in Amsterdam. This year’s training co
urses offer the essential knowledge and skills to defend your enterprise a
gainst today’s threats.

GrrCON 2014

\n

GrrCON is an information security and hacking conference that provide
s the Midwest InfoSec community with a fun atmosphere to come together and
engage with like minded people. We keep GrrCON small with around 1\,000 a
ttendance to allow us to provide those things other events leave out. Whet
her you are a Fortune 500 executive\, security researcher\, industry profe
ssional\, student\, or a hacker of “flexible” morals you will find somethi
ng for you at GrrCON 2014.

\n

All tickets include free food\, free BE
ER\, SWAG\, con badge\, After Party\, whatever else we can think of.

\n

GrrCON 2014 Keynotes

\n

\n

David Kennedy

\n

Jayson E.
Street

\n

\n

About GrrCON

\n

GrrCON is an information security and hac
king conference put together to provide the community with a venue to come
together and share ideas\, information\, solutions\, forge relationships\
, and most importantly engage with like minded people in a fun atmosphere
without all the elitist
“Diva” nonsense. We bring together the CISO\, the hacker\, the security pr
actitioner\, and the researcher in a one-of-a-kind experience you CANNOT g
et elsewhere.

\n

We provide three+ presentation tracks\, in-con works
hops\, pre-con training\, and a solutions arena to ensure you get the most
out of the event. Come join the conversation.

HouSecCon 2014 aka Hou.Sec.Con 5.0

\n

Keynote Speaker – Dave Kennedy

\n

Welcome to Hou.Sec.Con 2014\
, a.k.a. Hou.Sec.Con 5.0\, THE Houston Security Conference! This is our 5t
h year of serving the Houston area. Our mission is to continue to offer a
high-quality conference with the goal of educating Houstonians (and anyone
else who wants to come out) through great information security talks\, tr
aining\, and special attractions.The last few years have seen us grow to o
ver 400 attendees. And we are planning on this year being the best of all.

As you can see\, the them
e of Hou.Sec.Con has changed again this year. We are honoring the Builders
and the Breakers with some very familiar characters. But what do we mean
by Builders and Breakers? Let’s see if we can explain…

\n

Builders
h2>\n

The Builders are you folks in the trenches everyday\, protecting i
nfrastructures and organizations from the bad guys. You are the ones stayi
ng up late at night installing security technologies\, patching systems\,
writing policies\, performing risk assessments\, reviewing logs\, and just
generally performing all other manner of security minutia.

\n

Break
ers

\n

The Breakers are all of you who enjoy trying to find the hole
s in the infrastructure. You stay up late also\, but you’re busy fuzzing a
n app\, inserting crazy characters in a query\, pushing buttons in a weird
sequence on a device\, sniffing and replaying packets\, and otherwise jus
t causing havoc (in an ethical way\, of course)!

\n

It doesn’t matter
which camp you home\, or if you spend time in both camps. We celebrate yo
ur dedication to the honorable profession of information security! You des
erve a break! Come down to Hou.Sec.Con 2014 for a day and enjoy! Along wit
h the website\, we’ll be creating new t-shirts\, new challenge coins\, new
badges\, and other cool stuff. Ticket sales\, CFP\, and more are coming s
oon. And we’re doing it all for the same low price! We’re excited\, and yo
u should be too! Mark your calendars now for October 16\, 2014!

\n

T
raining at HouSecCon 2014

\n

“Hunting the White Whale” – Off
ensive Application Pentesting

\n

This course will introduce
the attendees to the concepts of Information Security\, the security issue
s that plague all applications today\, learn how to create an attack strat
egy\, and execute against the problem. This course will encompass both com
mon and easily exploitable vulnerabilities and the more advanced or custom
exploits and techniques that attackers use in the real world. We will dis
cuss what motivates an attacker\, what the types of mindsets are\, and wha
t tools they will most likely use.

Security B-Sides DC is a regional Security B-Sid
es held in Washington\, DC. It operates under the umbrella principles of S
ecurity B-Sides as a larger community project within information security.

\n

Each Security B-Sides is a community-driven framework for buildin
g events for\, and by\, information security practitioners. The goal is to
expand the spectrum of conversation beyond the traditional confines of sp
ace and time. It creates opportunities for individuals to both present and
participate in an intimate atmosphere that encourages collaboration. It i
s an intense event with discussions\, demos\, and interaction from partici
pants. It is where conversations for the next-big-thing are happening.

\n

Our schedule is onli
ne! Please note the schedule is subject to change\, so be sure to revi
ew it as you go. You can refer to this page up to and through the event it
self. A version will be published in the brochure for the event as well\,
which will be available at registration.

\n

Our keynote is Jericho\,
from Attrition.org\, who will be speaking on “How to Hack a Squirrel” (
or possibly Gregory Evans\, we’re not sure). Actually\, we have no idea wh
at Jericho is going to say. We’re going to provide a microphone and hope f
or the best.

A large group
of devoted and slightly crazy people may make up the organizers\, who each
serve in various committees as well\, including Infrastructure\, Voluntee
rs\, Sponsorships and CFP. We are very grateful to everyone on the team fo
r their efforts every year to make this event happen. But of course\, in a
ddition to those named above\, we also have our legion of volunteers without which our event would not
function. So to all of you as well\, we say\, “Thanks!”.

BSides Raleigh 2014

\n

Securi
ty B-sides (BSides) is a community-driven framework for building events fo
r and by information security community members. The goal is to expand the
spectrum of conversation beyond the traditional confines of space and tim
e. It creates opportunities for individuals to both present and participat
e in an intimate atmosphere that encourages collaboration. It is an intens
e event with discussions\, demos\, and interaction from participants. It i
s where conversations for the next-big-thing are happening.

\n

\n

Security is top of mind across the entire sphere of IT and the world be
yond. Therefore\, more people and organizations are interested in the next
new thing in security. BSides is the place where these people come to col
laborate\, learn and share. With many tech-companies\, colleges and univer
sities in Raleigh\, Durham\, Chapel Hill and surrounding areas\, it is als
o an international center of innovation in the security industry.

\n

BSides Raleigh will take place the day after ISSA’s Triangle InfoSeCon\, so you have two days o
f action-packed security presentations!

\n

Activities at BSides Rale
igh 2014

\n

Lockpick Village

\n

FALE’s Mission: To address\,
educate\, coordinate\, and provide training on the principles of physical
security for homes and businesses.

\n

Sponsor Expo Area and Recruiti
ng Event

\n

Our Gold and Platinum sponsors will be sharing their kno
wledge with us in the Sponsor Area.

\n

Recruiting Event!

\n

You’ll have the opportunity to talk to real employees and rec
ruiters and ask questions about what it’s like to work at these companies!
Bring your resume!

An ecclectic gathering of infosec people to he
ar awesome talks and have outrageously fun discussions! Our mission is to
provide an inclusive\, open environment for the sharing and collaborative
discourse on topics that most interest you.

Name: Michael Gough\nTalk:“You can f
ind the most advanced malware\, even the sneaky NSA stuff with this method
”

\n

\n

\n

11:50 AM – 12:30 PM

\n

<
strong>LUNCH!

\n

\n

\n

12:30 PM – 1:00 PM

\n

Name: John Nicholson\nT
alk: Securing a VMware environment

\n

\n

\n

1:05 P
M – 2:00 PM

\n

Name: Ste
phen Coty\nTalk: The State of Cloud Security in 201
4: Increase in Attacks in Cloud and On-Premise

\n

\n

\n

2:05 PM – 2:45 PM

\n

Name: Ricky Allen\nTalk: Infosec Lessons from Indiana Jo
nes

\n

\n

\n

2:45pm

\n

Closing

\n

\n

\n

3:00 PM till 4ish

\n

Fireside Talks at t
he Fox and Hound

\n

\n

\n

4ish till – ?? PM

\n<
td>AFTER PARTY!\n

\n\n

\n

\n

“Hac
kenger Hunt”

\n

“Participants will attempt to find virtual flags hid
den throughout the closed network environment using a mix of skills rangin
g from the most basic ping sweep to compile-your-own exploits. All skill
levels\, ages\, individuals and teams\, are welcome – bring a laptop with
your tools (Kali will be fine for most tasks) and jack in! We’ll have two
different challenge levels available. Ring 0 is for participants wanting
to learn the basics of hacking through hands-on walkthroughs. Ring 1 is
for participants looking to play without the pretension or pressure of a c
apture the flag environment. Points are awarded for finding the flags\, a
nd prizes are awarded based on top finishers – we may award prizes for oth
er things too – stop by and check us out. Brought to you by Delta Risk (<
a href='http://www.delta-risk.net/' onclick='__gaTracker('send'\, 'event'\
, 'outbound-article'\, 'http://www.delta-risk.net/'\, 'www.delta-risk.net'
)\;'>www.delta-risk.net).

SANS Network Security 2014

\n

We are pleased to
invite you and your colleagues to attend SANS Network Security 201
4 at the magnificent Caesars Palace\, Las Vegas\, on October 19-27. Network Security is your annual networking opportunity
! SANS will bring you the best in network security training\, certificatio
n\, and up-to-the-minute research on the most important topics in the indu
stry today.

\n

5% OFF Any SANS Course! Any Format!\nUse Coupon Code:
SANS_EHN150

\n

If you have att
ended this event in the past\, then you know how valuable it can be to you
r career and to the safety and preservation of your company’s online and c
omputerized resources. Be assured that at SANS Network Security 2014\, you
’ll get hands-on\, immersion training from SANS world-class instructors an
d learn what it takes to stop cyber crime for your organization. Those who
attend SANS Network Security 2014 will see that SANS offers a high-energy
program\, hands-on labs\, a huge Vendor Solutions Expo\,
evening talks on the most timely security challenges\, plus a myriad of n
etworking opportunities.

We already said that networking opportunities abound a
t SANS Network Security 2014. Along with your course\, you can attend the
SANS@Night presentations\, evening talks with keynote spe
akers\, and our Vendor events. Look for information to be
added regarding our SANS Network Security 2014 Vendor Showcase which provides a look at vendor products and solutions that can hel
p address your organization’s key security issues. In addition\, our vendo
rs will be featuring Lunch & Learn sessions throughout th
is event.

\n

Don’t miss the opportunity to participate in NetWars Tour
nament . NetWars Tournament is a live and timed event that runs over a
n intense two-day period. It is a competitive environment that creates a s
ense of urgency and pressure among the participants\, with a real-time sco
reboard available for viewing. Many enterprises\, government agencies\, an
d military organizations rely on NetWars Tournament training to help ident
ify skilled personnel and as part of extensive hands-on skill development.

\n

Another option is SANS DFIR NetWars Tournament. Th
is is an incident simulator packed with a vast amount of forensic and inci
dent response challenges\, for individual or team-based “firefights.” It i
s developed by incident responders and forensic analysts who use these ski
lls daily to stop data breaches and solve complex crimes. DFIR NetWars Tou
rnament allows each player to progress through multiple skill levels of in
creasing difficulty\, learning first-hand how to solve key challenges they
might experience during a serious incident. DFIR NetWars Tournament enabl
es players to learn and sharpen new skills prior to being involved in a re
al incident.

Th
is industry changes daily\, and the challenges you face are undoubtedly co
mplex. If you have pen testers\, forensics experts\, and application and s
oftware developers on your staff\, get them to come to Las Vegas. They wil
l bring back knowledge\, skills\, and tools that they will put to work the
day they return!

SecTor 20
14

\n

Illuminating the Black Art of Security. Now entering its 8th y
ear\, SecTor has built a reputation of bringing together experts from arou
nd the world to share their latest research and techniques involving under
ground threats and corporate defences. The conference provides an unmatche
d opportunity for IT Professionals and Managers to connect with their peer
s and learn from their mentors.

TRAINING at SecTor 2014

\n

Continuing
in the tradition of previous years\, SecTor 2014 will once again be runni
ng training sessions on Monday\, October 20th. Space in these t
raining sessions will be limited and expected to sell out. Don’t miss out
on this opportunity to spend a day with some of the world’s leading IT Sec
urity Experts.

ACTIVITIES at SecTor 2014

\n

\n

Network/Cocktail Reception & Party

\n

LockPick Village<
/li>\n

The Puzzle Contest

\n

Returning for 2014\, the SecTor Cap
ture the Flag Competition.

\n

\n\n

\n

Mission

\n

SecTor is Can
ada’s premier IT Security Education Conference. The annual event where IT
professionals from across Canada learn from and network with the world’s m
ost innovative\, intellectual\, exciting and entertaining security profess
ionals. SecTor is IT security training at its best.

\n

Background\n

SecTor was created by founders of TASK\, North America’s largest an
d most successful IT security user group. After many years of attending IT
Security events in the United States\, and being disappointed that no sim
ilar event existed in central Canada\, the decision was made to fill the v
oid. Now entering its 8th year\, SecTor has built a reputation of bringing
together experts from around the world to share their latest research and
techniques. In a non-threatening and productive way\, SecTor sheds light
on the underground threats and mischief that threaten corporate and person
al IT systems. Through identifying\, discussing\, dissecting and debating
these digital threats\, the strongest defences can be mounted.

SC Congress New York 2014

\n

There is no place be
tter than the most dynamic city in the world to gather leading security mi
nds to discuss the latest trends\, strategies and risk mitigation techniqu
es to help protect your organization – whether commercial or government –
from myriad and costly cyber threats. SC Congress New York 2014 will deliv
er the content\, dialogue\, networking and strategies you’ve come to expec
t from the event. It also will provide a look inside some of the most soug
ht-after security technologies on display by the industry’s top vendors in
our exhibition hall.

\n

Keynotes and all-star general sessions have
been designed to educate as well as create dialogue with participants and
present helpful\, practical\, take-away materials that attendees can consi
der for use in their own organizations. From mobile security to cloud comp
uting or governance\, risk and compliance planning (GRC)\, advanced persis
tent threats (APTs) and the cyber criminals who wish to cause your organiz
ations harm\, key topics that affect the security of your everyday enterpr
ise operations will be discussed. Hackivists\, nation-state actors and org
anized crime all play major roles in increasing security risk for your org
anization\, so to gain in-depth and timely knowledge about some of the lat
est exploits and attacks being used by such groups can help you avoid gett
ing bogged down with irrelevant information\, and provide the insight you
need to invest money and personnel power into the areas of your business t
hat need shoring up.

\n

It’s time and funds well spent. You won’t wan
t to miss SC Congress New York 2014. We can’t wait to see you there!

\n

What if? System failure in the Big Apple

\n

At th
is year’s SC Congress New York\, participants will hear from the author of
the best-selling book about the cyber world crashing down in New York Cit
y. Called CyberStorm\, this fast-selling novel is now also being
turned into a movie by 20th Century Fox. This keynote will be immediately
followed by a plenary session which will include some of the most sought-a
fter industry experts who will discuss the threats to critical infrastruct
ure\, as well as what we all can do to help protect it.

\n

Other topi
cs explored include:

\n

\n

Managing risk in a dynamic\, ever chan
ging environment\;

\n

What’s really happening in mobile security –
and what is and isn’t working\;

\n

Coming to grips and learning wha
t to do with the real likelihood that the bad guys already are in your net
works\;

SANS DFIRCON East 2014

This unique Digital Forensics and Incident Respo
nse (DFIR) event brings our most popular forensics courses\, instructors\,
and bonus seminars together in one place to offer one of SANS most compre
hensive DFIR training experiences. This is a must-attend event for you and
your team as our leading experts focus on building the DFIR skills that w
ill take you to that next level.

\n

\n<
li>Networking – One of the few DFIR-only training events on the SANS calen
dar! Join the most innovative minds in the industry to tackle advanced DFI
R issues.\n

DFIR NetWars Tournament – Free if you sign up for a cl
ass: SANS DFIR NetWars is a hands-on\, interactive learning environment th
at enables DFIR professionals to develop and master the skills they need t
o excel in their field.

\n

\n

This DFIR focused event has all of
your favorite courses and speakers\, and will also include special presen
tations. This is the second SANS DFIR dedicated training event\, held in t
he heart of downtown Fort Lauderdale on the trendy Las Olas Boulevard . As
an added bonus\, we will include our recently launched NetWars DFIR Tourn
ament over two nights of the event. This is a must-attend event as industr
y-leading experts focus on helping you take your DFIR skills to new levels
.

BSides Iceland 2014

\n

Sorry fo
r the delay but we assure you BSIDES ICELAND 2014 is happening!

\n

\n

This page will
update later today with more information.

\n

What is BSides
?

\n

Each BSides is a community-driven framework for buildi
ng events for and by information security community members. The goal is
to expand the spectrum of conversation beyond the traditional confines of
space and time. It creates opportunities for individuals to both present
and participate in an intimate atmosphere that encourages collaboration. I
t is an intense event with discussions\, demos\, and interaction from part
icipants. It is where conversations for the next-big-thing are happening.<
/p>\n

BSides DFW 2014

\n

Each BSides is a community-driven framew
ork for building events for and by information security community members.
The goal is to expand the spectrum of conversation beyond the traditiona
l confines of space and time. It creates opportunities for individuals to
both present and participate in an intimate atmosphere that encourages co
llaboration. It is an intense event with discussions\, demos\, and interac
tion from participants. It is where conversations for the next-big-thing a
re happening.

SANS Pen T
est Hackfest

\n

SANS Pen Test Hackfest Training Event and Summit is
an ideal way to take your penetration testing and vulnerability assessment
skills to an entirely new level. Featuring top-rated\, industry-leading e
xperts sharing their best tips and advice\, this must-attend event is focu
sed on building your skills in providing super high-value in your work. Ot
her hacker and pen test conferences cover interesting hacks\, but only the
SANS Pen Test Hackfest is focused on imparting skills you can directly ap
ply to your next project.

\n

$150 OFF Any SANS Course! Any Format!\nU
se Coupon Code: SANS_EHN150

\n

With two days of in-depth presentations followed by your choice of SANS t
op-rated penetration testing courses\, the SANS Pen Test Hackfest Training
Event and Summit is the place to be in November in Washington DC.

\n

As an added benefit\, we’ll also run an extended NetWars Tournament durin
g the evenings at the conference! These sessions will give you more time t
han ever with SANS awesome NetWars challenge series to even further build
your skills in a fun\, interactive\, hands-on fashion.

\n

\n\n

NetWars\, NetWars\, NetWars! This event will include THREE full ev
enings of NetWars challenges\, increasing the amount of NetWars time over
a traditional SANS conference. NetWars is an action-packed challenge envir
onment where people can build their skills while having fun.

\n

Coi
n-a-palooza: For participants who have taken a given SANS course\, but hav
e not won the capture the flag challenge coin\, this event will offer the
ability to catch up on the coins by participating in the four nights of Ne
tWars challenges. If you’ve taken 504 in the past (but didn’t win the coin
)\, and make it from NetWars Level 1 into 2\, you’ll earn the 504 coin! If
you make it into Level 3\, you’ll get your choice of a 542\, 560\, 561\,
573 or 575 coin\, provided you’ve taken the associated course sometime in
the past. Make it into Level 4\, and you’ll get your choice of a 617\, 642
\, 660 or 760 coin if you’ve had those classes! And\, if you win NetWars\,
you’ll get the NetWars coin. With Coin-a-palooza\, you’ll have an opportu
nity to win up to 4 challenge coins for your collection.

\n

CyberCi
ty: The SANS CyberCity project helps train cyber warriors that computer an
d network activities can have major kinetic impact on the real-world. With
its power grid\, traffic lights\, and water reservoir included in a physi
cal model city\, participants access and gain control over these assets\,
preventing attackers from wreaking havoc. This event will include a full e
vening session of CyberCity missions. This is one of the few annual events
where you have hands-on access to the physical city.

BSides JAX 2014

\n

Each BSides is a c
ommunity-driven framework for building events for and by information secur
ity community members. The goal is to expand the spectrum of conversation
beyond the traditional confines of space and time. It creates opportunit
ies for individuals to both present and participate in an intimate atmosph
ere that encourages collaboration. It is an intense event with discussions
\, demos\, and interaction from participants. It is where conversations fo
r the next-big-thing are happening.

BSides Vienna 2014

\n

Each BSi
des is a community-driven framework for building events for and by informa
tion security community members. The goal is to expand the spectrum of co
nversation beyond the traditional confines of space and time. It creates
opportunities for individuals to both present and participate in an intima
te atmosphere that encourages collaboration. It is an intense event with d
iscussions\, demos\, and interaction from participants. It is where conver
sations for the next-big-thing are happening.

\n

BSides Vienna 2014
After Party

\n

The after party will be held at the event location af
ter the conference finishes… there might even be a movie\, who knows

\n

Follow us and the discussion on
Twitter: @B
sidesVienna / #BSidesVienna

BSides Sao Paulo 2014\n

BSidesSP is a one-day conference on information security and hacker
culture\, organized by Brazilian InfoSec professionals with support from
Garoa
Hacker Clube\, the first hackerspace in Brazil. BSidesSP aims to promo
te the hacker culture and the integration between security researchers\, p
rofessionals\, and students.

\n

BSidesSP will be free of charge and w
ants to create a day full of activities to promote information security an
d hacker culture in the country\, with various activities scheduled to tak
e place simultaneously in various tracks\, including talks and technical w
orkshops. Attendees will also have the opportunity to discuss career in in
fosec industry (at Hacker Job Fair) and will have the opportunity to meet
Brazilian developers of Open Source tools at Brazilian Arsenal.

\n

\n

Ed Skoudis & Tim Medin

\n

\n

\n

SANS is hosting the third annual Tournament of Champions where the bes
t-of-the-best from past NetWars Competitions as well as the winners of oth
er security challenges have been invited to face off. This event will have
some of the most capable security professionals in the country matching w
its with each other in our ultimate tournament!

\n

NetWa
rs Tournament of Champions will be held at SANS CDI 2014 on December 15-16
at the Grand Hyatt Washington. The Tournament of Champions will be played
in conjunction with SANS CDI NetWars Tournament\, with a split screen and
modified scoreboard.

\n

Tournament of Champions is by i
nvite only. If you believe you qualify for this Tournament\, please contac
t us at netwars@sans.org and we will validate and register you. The $1249
fee will be waived for all individuals who qualify for the Tournament of C
hampions!

SANS Security East 2015

\n

Information security t
raining in New Orleans from SANS Institute\, the global leader in
information security training. At SANS Security East 2015\, SANS offers h
ands-on\, immersion-style security training courses taught by real-world p
ractitioners. The site of SANS Security East 2015\, January 16 – 21\, 2015
\, is the Hilton New Orleans Riverside\, located at the base of Canal and
Poydras Streets\, four blocks away from the French Quarter.

\n

$150 OFF Any
SANS Course! Any Format!\nUse Coupon Code: SANS_EHN150

\n

SANS is looking forward to an exciting
kickoff of 2015 with SANS Security East 2015 in the “Big
Easy” in January. Start the year off right by choosing from outstanding\,
cutting-edge courses presented by our top-rated instructors. Now is the ti
me to improve your information security skills and laissez les bons te
mps rouler!

ShmooCon 2015\nJanuary 16-18

\n<
p>DIFFERENT - ShmooCon is
an annual east coast hacker convention hell-bent on offering three days o
f an interesting atmosphere for demonstrating technology exploitation\, in
ventive software and hardware solutions\, and open discussions of critical
infosec issues. The first day is a single track of speed talks called On
e Track Mind. The next two days bring three tracks: Build It\, Belay It
and Bring It On.\n

AFFORDABLE - ShmooCon is about high
quality without the high price. Keep in mind that space is limited\, and
we’ve sold out quickly every year.

\n

ACCESSIBLE – ShmooCon i
s held in Washington\, DC at the Washington Hilton about four blocks from
the DC Metro’s Dupont Circle Station. Fly into DCA\, IAD or BWI or take a
train to Union Station\, and you’re just a short cab ride away from the c
on.

Joseph
Lorenzo Hall is the Chief Technologist at the Center for Democracy & Tech
nology\, a Washington\, DC-based non-profit organization dedicated to ensu
ring the internet remains open\, innovative and free. Hall’s work focuses
on the intersection of technology\, law\, and policy\, working carefully t
o ensure that technology and technical considerations are appropriately em
bedded into legal and policy instruments. Supporting work across all of CD
T’s programmatic areas\, Hall provides substantive technical expertise to
CDT’s programs\, and interfaces externally with CDT supporters\, stakehold
ers\, academics\, and technologists.

\n

\n\n

The Shmoo Group

\n

The Shmoo Group is a think-tank of like-minded individuals who share a passion for infor
mation security research and development. TSG members’ expertise incorpora
tes field-dressing a moose to extragalactic astrophysics to Python capabil
ities\, cutting-edge wearable computing to encryption to sharp-shooting. T
he group mind adds a razor-sharp sense of sarcasm to a refusal to take any
thing about the Internet seriously\, mixed liberally with tequila\, commun
ity service\, wireless networking and RFID hackery.

BSides Austin 2015

\n

Security is still Weird and SCARY!!!

\n

Join us for
an excellent two-day conference with an excellent line-up of speakers\, ha
ppy hours\, BrewSides\, and more!

\n

We offer FREE admission to activ
e military personnel and students. Send an email to BSidesAustin@gmail.com
to request.

\n

Each BSides is a community-driven framework for build
ing events for and by information security community members. The goal is
to expand the spectrum of conversation beyond the traditional confines of
space and time. It creates opportunities for individuals to both present
and participate in an intimate atmosphere that encourages collaboration.
It is an intense event with discussions\, demos\, and interaction from par
ticipants. It is where conversations for the next-big-thing are happening.

\n

Keynote at BSides Austin 2015

\n

TEN CRAZY IDEAS F
OR FIXING SECURITY\n-Wendy Nather

\n

The security industry is growing like never before — not just in the numbe
r of startups and ideas\, but in investments and valuation. And yet some o
f these “new ideas” seem awfully familiar (don’t IOCs sound a lot like sig
natures to you?). The number of breaches isn’t decreasing\; vulnerabilitie
s are discovered on a daily basis\, sometimes after having been around for
decades. Maybe what we need is some outside-the-sandbox thinking. In this
session\, 451 Research director Wendy Nather will throw out the data from
over 1\,000 security vendors and start fresh with some ideas so crazy\, t
hey just might work. No sacred cows will be admitted to the keynote except
in the form of BBQ brisket.

BSides ATL 2015
h1>\n

BSides Atlanta is the premiere information security “un-conference
” put on by infosec folks for infosec folks. Join us at the Atlanta Tech
Village for a day of great talks and meetup with others in the community!<
/p>\n

Each BSides is a community-driven framework for
building events for and by information security community members. The go
al is to expand the spectrum of conversation beyond the traditional confin
es of space and time. It creates opportunities for individuals to both pr
esent and participate in an intimate atmosphere that encourages collaborat
ion. It is an intense event with discussions\, demos\, and interaction fro
m participants. It is where conversations for the next-big-thing are happe
ning.

\n

NEW CTF CONTEST THIS YEAR!

\n

Virtual Capture the Flag – Designed and managed by Chris Silvers.

\n

Description: Unlike most CTFs\, the targets are
real (people)\, the flags are real (information)\, and it doesn’t take a P
hD in cryptography to win! Join a team and show everyone your Internet sta
lking skills in this one-of-a-kind CTF (that we know of). Prizes are award
ed for the top 3 teams and include highly coveted social engineering tools
. Check back often for more details!

BSides Vancouve
r 2015

\n

BSides Vancouver is a two-day\, high-caliber ga
thering for information security professionals\, hackers\, coders and the
greater tech community. During the conference attendees will share\, discu
ss and learn about information security\, privacy and technology in the he
art of Vancouver.

\n

BSides Conferences are a little diffe
rent than the usual security conference format. BSides are not-for-profit\
, independently run\, community supported\, low cost security conferences
that happen all over the world. The majority of security conferences these
days are nothing more than paid for speaking slots and not smart people s
haring smart things\, we are out to change this.

CanSecWest 2015 – Vancouver

\n

CanSecWest 2015\, the world’s most advanced co
nference focusing on applied digital security\, is about bringing the indu
stry luminaries together in a relaxed environment which promotes collabora
tion and social networking. The conference lasts for three days and featur
es a single track of thought provoking presentations\, each prepared by an
experienced professional and talented educator who is at the cutting edge
of his or her field. We give preference to new and innovative material\,
highlighting important\, emergent technologies\, techniques\, or best indu
stry practices.

\n

The conference is single track\, with one hour pre
sentations over the duration beginning at 9:00 a.m. The registration fee i
ncludes the catered meals\, and there will be a vendor display and lounge/
eating area\, where wireless internet access will be available (as well as
in the speaking theater).

Andy Davis\, NCC Group
– From baseband to bitstream and back again: What security researchers rea
lly want to do with SDR

\n

\n

\n

Also plea
se check the CanSecWest 2015 Dojo page we have added more new Dojos this year than
in any other previous year. New courses on USB Armory/ARM TrustZone\, Aud
iting Web Apps\, Software Defined Radio\, BIOS&SMM Attack&Defense\, as wel
l as all the other usual outstanding advanced training from some of the wo
rld’s sharpest folks. Upgrade your technology with education.

CarolinaCon 11

\n

The La
st CarolinaCon As We Know It

\n

Car
olinaCon is an annual conference in North Carolina that is dedicated t
o sharing knowledge about technology\, security and information rights. Ca
rolinaCon 11 also serves to enhance the local and international awareness
of current technology related issues and developments. CarolinaCon also st
rives to mix in enough entertainment and side contests/challenges to make
for a truly fun event.

\n

Side Events at CarolinaCon 11

\n

\n

Android Netrunner

\n

CC Shootout

\n

Capture The Flag

\n

FALE Lockpicking Village

\n

Mobile Museum of Vintage Technol
ogy

\n

\n

CarolinaCon was started in 2005 and has been held ever
y year since. With each passing year the conference continues to grow and
attract more attendees and speakers. As has always been the case\, Carolin
aCon is put together and run by an all-volunteer staff. CarolinaCon is pro
udly brought to you by “The CarolinaCon Group”. The CarolinaCon Group is a
non-profit organization registered in the state of NC\, dedicated to educ
ating the local and global communities about technology\, information/netw
ork/computer security\, and information rights.

\n

The CarolinaCon Gr
oup is also closely associated with various 2600 chapters across NC\, SC\,
TN\, VA\, LA\, DC\, GA\, PA and NY. Many of the volunteers who help devel
op and deliver CarolinaCon come from those chapters.

InfoSec World
2015

\n

The MISTI team is excited to bring you a lineup of conference se
ssions\, workshops and summits that address the most pressing matters in i
nformation security today. With a selection of our top-rated returning spe
akers and a roster of highly-regarded new-to-InfoSec World speakers\, we a
re certain you will find content that is compelling\, actionable and appli
cable to the current challenges you face at your job. Join us in Orlando
span> and experience our enhanced netwo
rking opportunities and themed receptions filled with interactive activiti
es. We look forward to welcoming
you at InfoSec World at Disney in March!

Black Hat Asia 2015

\n

Black Hat is returning to Asia again in 2015\
, and we have quite an event in store. Here the brightest professionals an
d researchers in the industry will come together for a total of four days–
two days of deeply technical hands-on Trainings\, followed by two days of
the latest research and vulnerability disclosures at our Briefings.

\n<
h2>Briefings

\n

The Black Hat Briefi
ngs have become the most important security conference series in the w
orld by sticking to our core value: serving the information security commu
nity by delivering timely\, actionable security information in a friendly\
, vendor-neutral environment.

\n

Trainings

\n

Black Hat Asia 2
015 is set to bring together the best minds in security to define tomorrow
’s information security landscape in Singapore. This year’s Training courses offer the essential knowledge and sk
ills to defend your enterprise against today’s threats.

\n

Business
Hall

\n

Featuring top international solution providers showcasing th
e latest tools\, technologies and services supporting the security communi
ty. The 2015 Black Hat Asi
a Business Hall brings more opportunities for attendee\, vendor and co
mmunity engagement\, including an expanded Show Floor\, Vendor Sessions an
d a sleek Networking Lounge.

Cybertech 2015<
/h1>\n

The rapid cyber revolution of the last few years has profoundly c
hanged the world we live in. Over time\, the world around us – from our cl
ose physical environment to the critical infrastructures providing the fou
ndation for life in our cities and states – has grown increasingly depende
nt on information and communication systems for its everyday activity. Alo
ng with the opportunities this dependence offers\, owing to cyberspace bei
ng a growth and innovation engine\, it also gives rise to sophisticated en
emies and threats that are more complex than ever before\, which are being
perfected and refined methodically.

\n

In the face of these enemies
and threats\, individuals\, organizations and states are required to produ
ce innovative\, unique solutions that would improve the resistance and res
ilience of the sensitive systems they rely on every day. For this purpose\
, it is essential to maintain a direct\, on-going contact with the latest
developments and changes in the cyber defense market. The Israeli cyber in
dustry and the local ecosystem where it operates constitute a pioneering\,
innovation-driving force and an attractive objective for the realization
of this goal.

InfoSec Southwest 2015

\n

Inf
oSec Southwest is an annual information security and hacking conference he
ld in Austin\, Texas\, one of the most interesting and beautiful cities in
the United States. By addressing a broad scope of subject-matter\, InfoSe
c Southwest is intended to both provide a comprehensive and valuable forum
to all participants as well as fill a gap for our local attendees left by
the other few conferences held here in Texas which are all focused on a n
arrower scope of subject matter or a narrower slice of audience demographi
c.

\n

InfoSec Southwest also provides a completely open lunch forum f
or lightning and turbo talks that is not constrained by a speaker selectio
n process\, mirroring our wildly successful local AHA! hacker meeting form
at. This forum is held during our long lunch breaks during both days of th
e conference and is open for anyone attending the conference to speak on a
ny topic they wish in a first-come\, first-speak order. As such\, we invit
e everyone to attend and participate.

\n

Keynote at InfoSec Southwes
t 2015

\n

Richard Thieme

\n

Too Much for Anyone to Kn
ow\n(or)\nHow to survive dur
ing war\, “cyber-mayhem\,” and the game of spy versus spy.

\n<
h2>Training at InfoSec Southwest 2015

\n

In addition to the lecture
tracks\, we have specialized and in-depth training courses available befor
e the conference proper. Classes include:

\n

\n

Art of Escape

\n

Basics of Pentesting with Metasploit

\n

Cloud Computing Secu
rity Knowledge – Foundation

\n

Cloud Computing Security Knowledge –
Foundation and Plus

\n

Metasploit Mastery

\n

\n

Events
at InfoSec Southwest 2015

\n

In addition to the lecture tracks\, we
have a few other interesting things going on at InfoSec Southwest that you
may enjoy:

SANS 2015

\n

Info
rmation security training in Orlando\, Florida from SANS Institut
e\, the global leader in information security training. This namesake even
t is SANS largest of the year with 42 Courses\, 37 Instructors in 6 Discip
lines and numerous other events and bonuses.

RSA Conference 20
15 – USA

\n

Same time\, same place\, same humongous crowds! RSA Conf
erence 2015 is not specifically focused on hacking\, pentesting and the li
ke\, but it is the largest general information security event and has been
for years.

Innovation Sandbox Con
test

Check out our Gallery of Victors and see which ones were acquired by Cisco and Juniper\, which had success
ful IPOs\, and how all received funding within a year of winning. Is your
company next? Ready to compete? Submissions open January 12\, 2015.

\n<
h2>The Sandbox\n

In this collaborative space\, you will have the op
portunity to engage in dynamic learning and networking opportunities. Kick
ing off the week with the popular RSAC Innovation Sandbox Contest\, The RS
AC Sandbox at Moscone Center North\, Room 134 continues through Thursday\,
hosting a suite of hands-on activities. Bring your forward-thinking ideas
to share with your peers and enrich your RSA Conference experience!

\n

The Viewing Point at Gateway

\n

\n

The Viewing
Point was introduced at RSA® Conference 2014 in direct response to the ne
eds of our attendees. We heard loud and clear that attending professionals
wanted to consume information and content at their own pace and in ways t
hat better suited their busy schedules and learning styles. So we built Th
e Viewing Point. By all accounts\, this space had a real impact on the Con
ference experience\, which is why it will continue to be part of RSA Confe
rence 2015.

\n

The Viewing Point has a lounge-style atmosphere that’s
comfortable and easily accessible. And provides our attendees an alternat
ive and casual way to watch and experience the keynotes and other programs
. Food and coffee along with comfortable seating\, Wi-Fi access\, power fo
r mobile devices\, and live Twitter boards are all available in this space
. During the opening keynotes on Tuesday\, April 21\, we may even have som
e special guests making an appearance—be sure to stop by and check it out.

\n\n

\n

\n

About RSA Conference

\n

\n

RSA Conference is helping drive the information security agen
da worldwide with annual industry events in the U.S.\, Europe and Asia. T
hroughout its history\, RSA Conference has consistently attracted the worl
d’s best and brightest in the field\, creating opportunities for conferenc
e attendees to learn about IT security’s most important issues through fir
st-hand interactions with peers\, luminaries and emerging and established
companies. As the IT security field continues to grow in importance and i
nfluence\, RSA Conference plays an integral role in keeping security profe
ssionals across the globe connected and educated.

\n

RSA developed RS
A Conference in 1991 as a forum for cryptographers to gather and share the
latest knowledge and advancements in the area of Internet security. Toda
y\, RSA Conference and related RSA Conference branded activities are still
managed by RSA\, with the support of the industry. RSA Conference event
programming is judged and developed by information security practitioners
and other related professionals.

THOTCON 0x6

\n

THOTCON (pronounced \\ˈthȯt\\ and
taken from THree – One – Two) is a small venue hacking conference based i
n Chicago IL\, USA. This is a non-profit\, non-commercial event looking to
provide the best conference possible on a very limited budget.

\n

On
ce you attend a THOTCON event\, you will have experienced one of the best
information security conference experiences combined with a uniquely casua
l and social experience.

\n

THOTCON 0x6 is the sixth incarnation of t
his event and will be held on Thursday and Friday May 14-15\, 2015.

\n<
p>It will be held at a location only to be disclosed to attendees and spea
kers during the week before the event.\n

– It will be held in the cit
y of Chicago.\n– It will be held at a bar-like venue (drink from 8:3
0am to close if you please).\n– It will be within walking distance f
rom a CTA Brown Line stop.\n– There will be food & drink for purchas
e all day.\n– Purchases will be CASH ONLY\, so plan ahead.\n>
There are plenty of ATMs in the area.

BSides Chicago 2015

\n

Each BSides is a co
mmunity-driven framework for building events for and by information securi
ty community members. The goal is to expand the spectrum of conversation b
eyond the traditional confines of space and time. It creates opportunities
for individuals to both present and participate in an intimate atmosphere
that encourages collaboration. It is an intense event with discussions\,
demos\, and interaction from participants. It is where conversations for t
he next-big-thing are happening.

\n

\n

Who is Speaking at BSi
des Chicago 2015?

\n

You. Your Friends. Your Coworkers. And that ran
dom guy who no one remembers his name but remembers he can code like a mac
hine. CFP will open soon.

CEIC 2
015

\n

\n

It’s no exaggeration to say that CEIC (Computer and En
terprise Investigations Conference) is the biggest digital-investigations
conference of its kind and the only one to offer hands-on lab sessions and
training for practical skills development. From sessions on acquiring evi
dence from mobile devices to international e-discovery to cyber security i
ntelligence\, there’s simply no other training or seminar series available
that packs so much relevant and practical information from so many expert
speakers into a four-day period.

It’s a cybersecurity conference<
/strong> where incident responders and information security specialists me
et up with their fellow experts from around the world to network and learn
the very latest security tactics.

\n

\n

\n

It’s a
legal technology conference where inside counsel and liti
gation support staff learn how to collaborate with information security pr
ofessionals prior to litigation.

\n

\n

\n

It’s a digital forensics conference where everyone from beginning
forensic investigators to the best of the best learn different and better
methods that take their professional capabilities to a whole new level.

App Central Wor
ld at CEIC 2015

\n

No CEIC experience is complete until you check ou
t EnCase App Central World. Staffed by Guidance Software experts as well a
s community experts who develop the apps that are available online\, EnCas
e App Central World is the place for getting a good look at the latest pro
ducts\, apps\, EnScripts\, and templates that improve your investigative w
orkflow so you can close more cases faster.

\n

Stop by EnCase App
Central World at CEIC to:

\n

\n

Learn about the diverse ecosy
stem of dozens of products that either extend\, integrate\, or work seamle
ssly with EnCase\, such as Internet Evidence Finder (IEF)\, a Volatility R
eporting Plug-in\, and useful extensions such as a VSS Examiner

Talk with EnCase Technology Partners as they showca
se their solutions.

\n

\n

Training at CEIC 2015

\n

The En
CE and EnCEP exam will be offered on Monday\, May 18 through Wednesday\, M
ay 20 from 8am – 3pm each day. An application is required to take the exam
\, but you are not required to register for a specific exam time. Once you
r application is accepted\, you will receive testing instructions and logi
n information.

SANS P
en Test Austin 2015

\n

Every organization needs skilled people who k
now how to find vulnerabilities\, understand risk\, and help prioritize re
sources based on mitigating potential real-world attacks. That’s what SANS
Pen Test Austin is all about! If you like to break things\, put them back
together\, find out how they work\, and mimic the actions of real-world b
ad guys\, all the while providing real business value to your organization
\, then this event is exactly what you need.

Every security professional needs to understand ho
w to get the most out of penetration tests and vulnerability assessments.
The SANS Pen
Test Austin 2015 event is a focused on helping you build world-class
security assessment and penetration testing skills to do just that. This e
vent is an IDEAL way to take your penetration testing and vulnerability as
sessment skills to an entirely new level. We’re bringing our most popular
pen test courses\, instructors\, and bonus sessions together in one place
to offer one of SANS most comprehensive Pen Test training experiences ever
.

\n

At the SANS Pen Test Austin 2015 event you will not only learn v
ital and in-demand skills and abilities\, but also network with like-minde
d security professionals that also see the benefit in taking their Pen Tes
t artistry to the next level.

\n

What’s special about SANS Pen Test
Austin 2015?

\n

\n

SANS Top Courses focused on Pen Testi
ng: Learn hands-on skills that you can directly apply the day you
get back to your job.

\n

NetWars\, NetWars\, NetWars: Enjoy three exciting nights of NetWars challenges\, where you can hav
e some fun while building serious infosec skills.

\n

Coin-a
-palooza: Earn up to four additional SANS pen test challenge coin
s (each with an integrated cipher challenge) based on your performance in
SANS NetWars!

\n

CyberCity Missions: Work through
an evening of cyber missions that have a direct kinetic impact on the mini
ature CyberCity environment that SANS built with a real power grid\, water
reservoir\, military base\, and more!

OWASP AppSecEU 20
15

\n

The BeNeLux chapters will host the OWASP AppSec Europe Researc
h 2015 global conference in Amsterdam\, The Netherlands from May 19-22. Am
sterdam is the capital of the Netherlandsandth
e largest cityof the country.

\n

The AppSec Europe 2015 conference will be a premier gathering of Info
rmation Security leaders\, also it is going to have a research part.

\n

Executives from Fortune 500 firms along with technical thought leaders
such as security architects and lead developers will be traveling to hear
the cutting-edge ideas presented by Information Security’s top talent. OWA
SP events attract a worldwide audience interested in “what’s next”. The co
nference is expected to draw 400-500 technologists from Government\, Finan
cial Services\, Media\, Pharmaceuticals\, Healthcare\, Technology and many
other verticals.

\n

The conference program will consist of five trac
ks (Developers\, Ops\, Hack\, CISO and Research). The full conference sche
dule will be available mid-February\, with a range of interesting and prov
oking keynote spe
akers to open and close each day of the conference presentations\, but
also a lot of satellite events.

\n\n

Events at OWASP AppSecEU
2015

\n\n

\n

Different satellite
events will take place during the AppSec Europe conference.

Th
e purpose of SOURCE Conference is to bridge the gap between technical exce
llence and business acumen within the security industry. SOURCE fosters a
community of learning where business and security professionals come toget
her to gain knowledge and skills\, network with peers\, and advance their
careers and professional development. SOURCE enables individuals\, teams\,
and organizations to leverage information to improve decision-making\, op
timize performance\, and achieve business objectives.

\n

Our Vision

\n

In our vision\, we see SOURCE as a leader in the security industry where a
ttendees\, speakers\, and sponsors identify solutions for the toughest and
most important problems:

\n

\n

An environment that fosters profe
ssional growth and development.

\n

Top technical and business exper
ts from around the world coming together to share technologies\, research\
, and security practices.

\n

A security community that is rewarding
and enjoyable to participate in.

\n

\n

At a Glance\n

\n

\n

Launched in 2008 in Boston\, Massachusetts\, USA.

\n

Averages 3
00-350 attendees in Boston\, 100 in Seattle\, and 60-80 in Barcelona.

\n

Focuses on bridging the gap between technological expertise and busi
ness excellence.

\n

Organized by many of the top minds in the secur
ity industry. Each member of our advisory board has deep roots in the secu
rity industry and a reputation for technical excellence.

HITBSe
cConf2015 Amsterdam

\n

The 6th Annual HITB Security Conf
erence in The Netherlands

\n

Held once again at De Beur
s van Berlage\, HITB2015AMS takes place from the 26th till the 29th of May
2015 and runs alongside HITB Haxpo – our 3-day technology expo for hacker
s\, makers\, builders and breakers. The Call for Papers for the conference
is now open and the first round of accepted speakers will be announced at
the end of January. As always\, do follow @HITBSecConf on Twitter for the
latest event updates.

\n

A deep-knowledge security event…

\n

HITBSecConf or the Hack In The Box Security Conference is an annual must a
ttend event in the calendars of security researchers and professionals aro
und the world. Held annually in Kuala Lumpur\, Malaysia and Amsterdam in T
he Netherlands\, HITBSecConf is a platform for the discussion and dissemin
ation of next generation computer security issues. Our events routinely fe
ature two days of trainings and a two-day multi-track conference featuring
cutting-edge hardcore technical talks delivered by some of the most respe
cted names in the computer security industry. HITBSecConf is a place where
ideas are exchanged\, talent discovered and genius celebrated.

HITB Haxpo 2
015 Amsterdam\nHackers // Makers // Breakers // Builders

\n

The second Haxpo in Amsterdam

\n

Our second e
dition of the Haxpo in Amsterdam will take place once again in the histori
c building “Beurs van Berlage” in the city centre of Amsterdam. Featuring
35+ companies in our exhibition and countless other events taking place du
ring the 3-day Haxpo madness! Get more information about what the Haxpo is
at www.haxpo.nl

ShowMeCon 2015

\n

St. Louis’ Hacking & Cyber Security Con

\n

ShowMeCon. The
name says it all. Known as the Show Me State\, Missouri is home to St. Lo
uis-based ethical hacking firm\, Parameter Security\, and security training compan
y\, Hacker University. Toget
her\, they are bringing you a one-of-a-kind event that will Show You the S
tate of security from a unique perspective – the hacker’s viewpoint.

\n

Pre-Con Training: June 3 – 7\nHacker Con: June 8 – 9

\n

This highly technical foru
m showcases eye-opening presentations from world-renown ethical hackers an
d epic security ninjas which will leave you amazed and frightened at the s
ame time. By giving you access into the mind of a hacker\, you will better
understand how to protect your networks and critical data. As we always s
ay “In order to beat a hacker\, you have to think like one” and “if you do
n’t understand the enemy\, how can you protect against him?” ShowMeCon pul
ls back the curtain and exposes how hackers are winning the war on physica
l and cyber security.

\n

Pre-Con Training at ShowMeCon 2015

\n

ShowMeCon 2015 will be jammed with content specifically and immediately a
pplicable to your career. For starters\, the winner will get their choice
of the following courses (click the course title for more info):

Whether
you’re a large corporation or a small business\, you should attend this m
ind-blowing event as you witness the cream of the crop unveil the latest a
ttacks\, techniques\, tactics and practices of today’s hackers. Plus\, gai
n insight and understanding into ways to effectively protect yourself so y
ou can implement this information immediately when you return to your busi
ness.

SC Congress Toronto 2015

\n

SC Co
ngress Toronto is our largest show in the SC Congress portfolio. Spanning
two days\, our Canadian conference and expo attracts over 1\,000 cybersecu
rity pros on average in North America and beyond.

\n

2015 is slated t
o be one of our best years ever\; SC Congress Toronto 2015 will be moving
to more spacious accommodations in the Metro Toronto Convention Centre and
boast an even more robust Exhibit Hall than any other year. Our 2014 show
floor was sold out and 2015 should be no exception\, featuring even more
of the top names and brands in info security. Mark your calendars for June
10-11 for a not-to-be missed SC Congress Toronto.

\n

Aside from our
enhanced Exhibit Hall\, SC Congress Toronto 2015 will – as always – featur
e our hallmark programming\, delivering the latest insights on all the iss
ues cyber security professionals need to stay ahead of their game – and th
e growing number of cyber threats and criminals. Our 2014 event addressed
such pressing issues including PCI Revisited\, The Art of Cyberwar\, A
Day in the Life of a CISO\, Effective Methods for Engaging the Board of Di
rectors About IT Security\, 21st Century Incidence Reponse\, Io
T Java Exploited and the Growing Rise of Ransomware\, to name j
ust a handful of topics. Our 2015 SC Congress will pick up with all new to
pics and address all of the issues moving today’s – and more importantly –
tomorrow’s – headlines.

CircleCityCon 2015

\n

CircleCityCon is a securi
ty conference held in downtown Indianapolis. Our inaugural con last year w
as a big success and we are only looking to grow and make it better.

\n

CircleCityCon is about the community. Our signature offering is the com
munity led training classes offered to all participants. Events and contes
ts are organized by members of the security community\, including both Cir
cleCityCon staffers and community partners. Two tracks\, incredible entert
ainment\, and technical villages help round out the CircleCityCom experien
ce. Of course\, don’t forget the chance to meet and talk with your peers a
bout all topics including security\, hacking\, and the latest superhero mo
vie.

Hak4Kidz 2015

\n

Hak4Kidz is the first official youth based ethical hacking conference in C
hicago that is *not* a hackathon.

\n

Hak4Kidz is an eve
nt by ethical hackers and Information Security professionals dedicated to
bring the educational and communal benefits of whitehat hacking conference
s to children and young adults. We plan to accomplish this mission by putt
ing our collective expertise and passion on display for the attendees to i
nteract with us at their will. A combination of youth base speaking tracks
complementing an open area of stations will enable the attendees to expan
d and enlighten their technical interests. For innovation to perpetuate\,
it’s imperative that today’s young users are exposed to the bigger picture
of how we got here and to help realize their potential.

\n

Activiti
es at Hak4Kidz 2015

\n

Additional activities for Hak4Kidz are still
being finalized\, so please check back regularly. In the meantime\, these
are the activities from last year:

\n

Time to get your hak on with th
ese educational activities from 2014:

\n

\n

jrCTF – junior Capture The Flag contest for prizes

\n

Snap Circ
uits – Award winning engineering toy by Elenco

\n

Networking Playground – Hooking up network gear and securing them

\n

Homemade Hacks – Old tech meets new tech for a
lternative tech! And a programmable robot!!

SteelCon 2015

\n<
p>With a growing international interest in security events and hacker conf
erences\, and the increasing focus on security in the media\, SteelCon off
ers a unique opportunity for you to get involved and develop your hacking*
skills.\n

After last years very successful event we will be back in
2015\, bigger and better. Capacity will be doubled\, there will be more a
ctivities and hopefully a lot more fun.

\n

The North’s Premier Hacker* Con!

\n

It doesn’t matter what your
background is\, whether you’re a security professional or penetration test
er by trade or a hobbyist who’s just picked up your first Raspberry Pi. Th
is is a conference with something for everyone in a family friendly enviro
nment\, with activities for big kids and little kids so come along and joi
n in.

\n

The Events Team

\n

*hacke
r: n. someone with an interest in how things work\, how things can be brok
en and how they can be fixed.

RSA Conference Asia Pacific & Japan 2015

\n

RSA Conferenc
e Asia Pacific & Japan is the leading information security event in the re
gion. Join us for three days of engaging sessions and intense networking.
Get exposure to innovative technologies and leadership that will help secu
re your organization and your future.

\n

RSA Conference Asia Pacific
& Japan 2015 will take place at the Marina Bay Sands in Singapore 22 to 24
July.

*A discount code will be emailed to you when Early Bi
rd Registration opens. Only one discount code can be used per registration
. Discount offers cannot be combined.

\n\n

About RSA Conf
erence

\n

\n

RSA Conference is helping drive the i
nformation security agenda worldwide with annual industry events in the U.
S.\, Europe and Asia. Throughout its history\, RSA Conference has consist
ently attracted the world’s best and brightest in the field\, creating opp
ortunities for conference attendees to learn about IT security’s most impo
rtant issues through first-hand interactions with peers\, luminaries and e
merging and established companies. As the IT security field continues to
grow in importance and influence\, RSA Conference plays an integral role i
n keeping security professionals across the globe connected and educated.<
/p>\n

RSA developed RSA Conference in 1991 as a forum for cryptographers
to gather and share the latest knowledge and advancements in the area of
Internet security. Today\, RSA Conference and related RSA Conference bran
ded activities are still managed by RSA\, with the support of the industry
. RSA Conference event programming is judged and developed by information
security practitioners and other related professionals.

Black Hat USA 2015

\n

Black Hat – built by and for the glob
al InfoSec community – returns to Las Vegas for its 18th year.
This six day event begins with four days of intense Trainings for security
practitioners of all levels (August 1-4) followed by the two-day main eve
nt including over 100 independently selected Briefings\, Business Hall\, A
rsenal\, Pwnie Awards\, and more (August 5-6).

\n

More specific i
nfo will be posted when available.

\n

About Us

\n

Black H
at is the most technical and relevant global information security event se
ries in the world. For more than 16 years\, Black Hat has provided attende
es with the very latest in information security research\, development\, a
nd trends in a strictly vendor-neutral environment. These high-profile glo
bal events and Trainings are driven by the needs of the security community
\, striving to bring together the best minds in the industry. Black Hat in
spires professionals at all career levels\, encouraging growth and collabo
ration among academia\, world-class researchers\, and leaders in the publi
c and private sectors.

\n

From its inception in 1997\, Black Hat has
grown from a single annual conference in Las Vegas to the most respected i
nformation security event series internationally. Today\, the Black Hat Br
iefings and Trainings are held annually in the United States\, Europe and
Asia\, providing a premier venue for elite security researchers and traine
rs to find their audience.

\n

What We Do

\n

Briefings<
/strong>\nThe Black Hat Briefings were created more than 16 years ag
o to provide security professionals a place to learn the very latest in in
formation security risks\, research and trends. Each year\, internationall
y leading security researchers take the stage to share their latest work a
nd exploits in a friendly\, vendor-neutral environment. Vulnerabilities ar
e often exposed that impact everything from popular consumer devices to cr
itical international infrastructure and everything in between. Black Hat s
eeks groundbreaking research to fill both 25 and 50-minute speaking slots
for each annual show.

\n

Trainings\nThe Black
Hat Trainings offer attendees individual technical courses on topics rangi
ng from the latest in penetration testing to exploiting web applications a
nd even defending and building SCADA systems. Often designed exclusively f
or Black Hat\, these hands-on attack and defense courses are taught by ind
ustry and subject matter experts from all over the world with the goal of
defining and defending tomorrow’s information security landscape.

DEF CON 23
h1>\n

As we’ve mentioned here on EH-Net for years\, this is one of those
events that you must attend at least once in your life… preferably multip
le times. It is often said that DEF CON is what you make it. This is 100%
accurate as there are so many talks\, events\, parties and people that 20
people can go to the same event and not see each other or have the same ex
perience. For a little more on this\, it might help to watch DEF CON 101 f
rom DEF CON 17. It’s a few years old\, but the concept is the same:

\n<
p>\n

The DEF CON Story

\n

Originally started in 1993\,
it was a meant to be a party for member of “Platinum Net”\, a Fido protoco
l based hacking network out of Canada. As the main U.S. hub I was helping
the Platinum Net organizer (I forget his name) plan a closing party for al
l the member BBS systems and their users. He was going to shut down the ne
twork when his dad took a new job and had to move away. We talking about w
here we might hold it\, when all of a sudden he left early and disappeared
. I was just planning a party for a network that was shut down\, except fo
r my U.S. nodes. I decided what the hell\, I’ll invite the members of all
the other networks my BBS (A Dark Tangent System) system was a part of inc
luding Cyber Crime International (CCI)\, Hit Net\, Tired of Protection (To
P)\, and like 8 others I can’t remember. Why not invite everyone on #hack?
Good idea!

\n

Where did the name come from?

\n

The short answer is a combination of places. There as a SummerCon in the s
ummer\, a HoHoCon in the winter\, a PumpCon during Halloween\, etc. I didn
’t want any association with a time of year. If you are a Phreak\, or just
use your phone a lot you’ll notes “DEF” is #3 on the phone. If you are in
to military lingo DEF CON is short for “Defense Condition.” Now being a fa
n of the movie War Games I took note that the main character\, David Light
man\, lived in Seattle\, as I do\, and chose to nuke Las Vegas with W.O.P.
R. when given the chance. Well I knew I was doing a con in Vegas\, so it a
ll just sort of worked out.

Converge Conference 2014

\n

Converge Confe
rence is an information security and technology gathering in one of the gr
eat tech cities in America. Centered in the heart of the domestic auto ind
ustry as well as a manufacturing hub\, Converge Conference is poised to cr
eate a buzz around information security in Detroit. We provide a venue for
people to come together who have diverse technological backgrounds and di
scuss issues that everyone in an organization has to deal with. From the t
echnicians to the developers to the various C-levels\, we want to carry th
e security discussion on through-out an organization. Together\, let’s mak
e sure that security meets the needs of the business and vice-versa.

\n

About

\n

\n

Converge was borne out of the idea that everyone
in an organization needs to be aware of Information Security at various l
evels for any security policy to have a real impact. Where other conferenc
es have fostered the communication between the influencers and implementer
s in information security\, Converge hopes to bridge that gap between the
decision makers and the influencers and implementers. We believe that the
only way to move forward and face the new challenges of security is by eng
aging all aspects of the business in a discussion about security.

\n

At Converge we want to get the executives talking to all levels of the inf
ormation security team. When executives understand the problems facing the
professionals on the front lines and professionals on the front lines und
erstand what drives management to make decisions on information security\,
everyone wins.

\n

Converge grew out of the community around BSides D
etroit and is organized by the same core group that has been putting on th
e Detroit conference since 2011.

\n

Converge is Thursday and Friday\,
July 10-11. BSides Detroit is
Saturday\, July 12.

BSides Charleston 201
4

\n

BSides is a community-driven framework for building events for
and by information security community members. The goal is to expand the s
pectrum of conversation beyond the traditional confines of space and time.
It creates opportunities for individuals to both present and participate
in an intimate atmosphere that encourages collaboration. It is an intense
event with discussions\, demos\, and interaction from participants. It is
where conversations for the next-big-thing are happening.

\n

BSides C
harleston was started in 2012 and has been held at the College of Charlest
on annually. Since its existence BSides Charleston has been attracting sec
urity professionals from all over the Lowcountry area for this one day eve
nt.

\n

BSides Charleston 2014 Keynote Speaker

\n

K
izz Myanthia

\n

Bio: Kizz MyAnthia has been in the Info
rmation Security field for over 14 years. Working with many diverse client
s from multi-national and global organizations\, .gov and DoD space\, and
every sized organization in between. He has hands-on experience testing ma
ny of the most dynamic and technically up-to-date systems used throughout
the world. Kizz is currently part of the PoV Team at HP Fortify’s ShadowLa
bs and works to drive Information Security practices through hands-on test
ing\, trainings\, defining and directing testing methodologies\, and worki
ng with organizations to develop Information Security programs and directi
ves that allow the business to function and grow\, but also to provide the
highest level security to the organization and their clients.

\n

Kiz
z has been at the forefront of Information Security since long before it w
as every known by that title. He began his career in 2000 and has been doi
ng so ever since. Kizz has spoken and taught at over 80 conferences around
the world.

Shakacon VII

\n

Shakacon\, an Information Technology (IT) Security Con
ference\, is back and ready to invite business executives\, government and
military officials\, security professionals\, and IT enthusiasts to parti
cipant in Hawaii’s only Call for Paper based IT security conference.

\n

We decided it was time to bring some top notch technical talent back to
one of the most remote locations on earth.

\n

Sitting around somewhe
re freezing your a$$ off? Dreaming about warm days\, rainbows\, decadent t
ropical drinks sipped out of coconuts? Sure you could drop your 0day in Ve
gas\, bring down the Internet in Germany\, or satisfy your dark desires in
Asia\; however\, wouldn’t you rather submit your research or topics to ou
r CFP and maybe win yourself a paid trip to Hawaii?

\n

Keynotes at Shakacon VII

\n

\n

Slipping out the f
ront door of the party: The challenges of detecting silent exits of your d
ata -Stephen Adegbite